Changes between Version 20 and Version 21 of GENIBibliography


Ignore:
Timestamp:
12/05/14 15:27:09 (5 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v20 v21  
    3636<!-- HTML to be inserted into wiki page. -->
    3737<!-- This page is auto-generated. Please do not edit by hand. -->
    38 
    39 <H1>GENI Bibliography</H1>
    40 
     38<hr>
     39<a id="full"><H1>GENI Bibliography</H1></a>
     40Year:&nbsp;
     41
     42<a href="#full-2006">2006</a>&nbsp;
     43
     44<a href="#full-2007">2007</a>&nbsp;
     45
     46<a href="#full-2008">2008</a>&nbsp;
     47
     48<a href="#full-2009">2009</a>&nbsp;
     49
     50<a href="#full-2010">2010</a>&nbsp;
     51
     52<a href="#full-2011">2011</a>&nbsp;
     53
     54<a href="#full-2012">2012</a>&nbsp;
     55
     56<a href="#full-2013">2013</a>&nbsp;
     57
     58<a href="#full-2014">2014</a>&nbsp;
     59
     60<br>
     61<a href="#concise">Jump to concise bibliography</a>
    4162<ol>
    4263
    43 
    44 <a class="EntryGoto" id="Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson"></a>
    45 <b class="myheading" style="position: relative; left: 5%;">Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</b>
    46 
    47 <div class="BibEntry">
    48 
    49 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    50 
    51 <li>
    52 
    53 
    54 <tr>
    55      <td valign="top">Author</td>
    56      <td valign="top">Aikat, Jay and Hasan, Shaddi and Jeffay, Kevin and Smith, F. Donelson</td>
    57 </tr>
    58 
    59 <tr>
    60      <td valign="top">Title</td>
    61      <td valign="top">Discrete-Approximation of Measured Round Trip Time Distributions: A Model for Network Emulation</td>
    62 </tr>
    63 
    64 <tr>
    65      <td valign="top">Booktitle</td>
    66      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    67 </tr>
    68 
    69 <tr>
    70      <td valign="top">Location</td>
    71      <td valign="top">Los Angeles</td>
    72 </tr>
    73 
    74 <tr>
    75      <td valign="top">Year</td>
    76      <td valign="top">2012</td>
    77 </tr>
    78 
    79 <tr>
    80      <td valign="top">Abstract</td>
    81      <td valign="top">Empirical evaluations to study network performance, whether in a laboratory setting or on GENI testbeds, rely heavily on measurement-based modeling of round trip times (RTTs) to emulate realistic end-to-end delays of local and metropolitan area networks. For generating realistic traffic, we studied several models to emulate RTTs. In this paper, we performed experiments on real testbeds using synthetic TCP traffic generated from measurement data from a large university campus. As a result of our study, we present the Discrete- Approximation model for RTT (DA-RTT) emulation. Using three different metrics for performance evaluation, which include queue length at routers, connection response times, and connection durations, we demonstrate that the simple DA-RTT model closely represents the per-connection RTTs in the original traffic. While these experiments were performed in our laboratory, and not using GENI infrastructure, we present this as a possible model for adoption on GENI testbeds to emulate Round Trip Time Distributions for GENI experiments.</td>
    82 </tr>
    83 
    84 
    85 
    86 
    87 
    88 
    89 </li>
    90 
    91 </table></div><br><br>
    92 
    93 
    94 
    95 
    96 <a class="EntryGoto" id="Albrecht, J. and Huang, D. Y."></a>
    97 <b class="myheading" style="position: relative; left: 5%;">Albrecht, J. and Huang, D. Y.</b>
    98 
    99 <div class="BibEntry">
    100 
    101 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    102 
    103 <li>
    104 
    105 
    106 <tr>
    107      <td valign="top">Author</td>
    108      <td valign="top">Albrecht, J. and Huang, D. Y.</td>
    109 </tr>
    110 
    111 <tr>
    112      <td valign="top">Title</td>
    113      <td valign="top">Managing distributed applications using Gush</td>
    114 </tr>
    115 
    116 <tr>
    117      <td valign="top">Journal</td>
    118      <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Testbed Practices Session (TridentCom)</td>
    119 </tr>
    120 
    121 <tr>
    122      <td valign="top">Year</td>
    123      <td valign="top">2010</td>
    124 </tr>
    125 
    126 <tr>
    127      <td valign="top">Abstract</td>
    128      <td valign="top">Deploying and controlling experiments running on a distributed set of resources is a challenging task. Software developers often spend a significant amount of time dealing with the complexities associated with resource configuration and management in these environments. Experiment control systems are designed to automate the process, and to ultimately help developers cope with the common problems that arise during the design, implementation, and evaluation of distributed systems. However, many of the existing control systems were designed with specific computing environments in mind, and thus do not provide support for heterogeneous resources in different testbeds. In this paper, we explore the functionality of Gush, an experiment control system, and discuss how it supports execution on three of the four GENI control frameworks.</td>
    129 </tr>
    130 
    131 
    132 
    133 <tr>
    134      <td valign="top">DOI</td>
    135      <td valign="top">10.1007/978-3-642-17851-1&#x005F;31</td>
    136 </tr>
    137 
    138 
    139 
    140 <tr>
    141      <td valign="top">URL</td>
    142      <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;31">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;31</a></td>
    143 </tr>
    144 
    145 
    146 </li>
    147 
    148 </table></div><br><br>
    149 
    150 
    151 
    152 
    153 <a class="EntryGoto" id="Albrecht, Jeannie R."></a>
    154 <b class="myheading" style="position: relative; left: 5%;">Albrecht, Jeannie R.</b>
    155 
    156 <div class="BibEntry">
    157 
    158 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    159 
    160 <li>
    161 
    162 
    163 <tr>
    164      <td valign="top">Author</td>
    165      <td valign="top">Albrecht, Jeannie R.</td>
    166 </tr>
    167 
    168 <tr>
    169      <td valign="top">Title</td>
    170      <td valign="top">Bringing big systems to small schools: distributed systems for undergraduates</td>
    171 </tr>
    172 
    173 <tr>
    174      <td valign="top">Journal</td>
    175      <td valign="top">SIGCSE Bull.</td>
    176 </tr>
    177 
    178 <tr>
    179      <td valign="top">Publisher</td>
    180      <td valign="top">ACM</td>
    181 </tr>
    182 
    183 <tr>
    184      <td valign="top">Address</td>
    185      <td valign="top">New York, NY, USA</td>
    186 </tr>
    187 
    188 <tr>
    189      <td valign="top">Year</td>
    190      <td valign="top">2009</td>
    191 </tr>
    192 
    193 <tr>
    194      <td valign="top">Abstract</td>
    195      <td valign="top">Distributed applications have become a core component of the Internet's infrastructure. However, many undergraduate curriculums, especially at small colleges, do not offer courses that focus on the design and implementation of distributed systems. The courses that are offered address the theoretical aspects of system design, but often fail to provide students with the opportunity to develop and evaluate distributed applications in real-world environments. As a result, undergraduate students are not as prepared as they should be for graduate study or careers in industry. This paper describes an undergraduate course in Distributed Systems that not only studies the key design principles of distributed systems, but also has a unique emphasis on giving students hands-on access to distributed systems through the use of shared computing testbeds, such as PlanetLab and GENI, and open-source technologies, such as Xen and Hadoop. Using these platforms, students can perform large-scale, distributed experimentation even at small colleges.</td>
    196 </tr>
    197 
    198 
    199 
    200 <tr>
    201      <td valign="top">DOI</td>
    202      <td valign="top">10.1145/1539024.1508903</td>
    203 </tr>
    204 
    205 
    206 
    207 <tr>
    208      <td valign="top">URL</td>
    209      <td valign="top"><a href="http://dx.doi.org/10.1145/1539024.1508903">http://dx.doi.org/10.1145/1539024.1508903</a></td>
    210 </tr>
    211 
    212 
    213 </li>
    214 
    215 </table></div><br><br>
    216 
    217 
    218 
    219 
    220 <a class="EntryGoto" id="Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin"></a>
    221 <b class="myheading" style="position: relative; left: 5%;">Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin</b>
    222 
    223 <div class="BibEntry">
    224 
    225 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    226 
    227 <li>
    228 
    229 
    230 <tr>
    231      <td valign="top">Author</td>
    232      <td valign="top">Albrecht, Jeannie and Tuttle, Christopher and Braud, Ryan and Dao, Darren and Topilski, Nikolay and Snoeren, Alex C. and Vahdat, Amin</td>
    233 </tr>
    234 
    235 <tr>
    236      <td valign="top">Title</td>
    237      <td valign="top">Distributed application configuration, management, and visualization with plush</td>
    238 </tr>
    239 
    240 <tr>
    241      <td valign="top">Journal</td>
    242      <td valign="top">ACM Trans. Internet Technol.</td>
    243 </tr>
    244 
    245 <tr>
    246      <td valign="top">Publisher</td>
    247      <td valign="top">ACM</td>
    248 </tr>
    249 
    250 <tr>
    251      <td valign="top">Address</td>
    252      <td valign="top">New York, NY, USA</td>
    253 </tr>
    254 
    255 <tr>
    256      <td valign="top">Year</td>
    257      <td valign="top">2011</td>
    258 </tr>
    259 
    260 <tr>
    261      <td valign="top">Abstract</td>
    262      <td valign="top">Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application deployment, monitoring, and maintenance in distributed environments, few tools provide a unified framework for application management. Many of the existing tools address the management needs of a single type of application or service that runs in a specific environment, and these tools are not adaptable enough to be used for other applications or platforms. To this end, we present the design and implementation of Plush, a fully configurable application management infrastructure designed to meet the general requirements of several different classes of distributed applications. Plush allows developers to specifically define the flow of control needed by their computations using application building blocks. Through an extensible resource management interface, Plush supports execution in a variety of environments, including both live deployment platforms and emulated clusters. Plush also uses relaxed synchronization primitives for improving fault tolerance and liveness in failure-prone environments. To gain an understanding of how Plush manages different classes of distributed applications, we take a closer look at specific applications and evaluate how Plush provides support for each.</td>
    263 </tr>
    264 
    265 
    266 
    267 <tr>
    268      <td valign="top">DOI</td>
    269      <td valign="top">10.1145/2049656.2049658</td>
    270 </tr>
    271 
    272 
    273 
    274 <tr>
    275      <td valign="top">URL</td>
    276      <td valign="top"><a href="http://dx.doi.org/10.1145/2049656.2049658">http://dx.doi.org/10.1145/2049656.2049658</a></td>
    277 </tr>
    278 
    279 
    280 </li>
    281 
    282 </table></div><br><br>
    283 
    284 
    285 
    286 
    287 <a class="EntryGoto" id="Angu, Pragatheeswaran and Ramamurthy, Byrav"></a>
    288 <b class="myheading" style="position: relative; left: 5%;">Angu, Pragatheeswaran and Ramamurthy, Byrav</b>
    289 
    290 <div class="BibEntry">
    291 
    292 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    293 
    294 <li>
    295 
    296 
    297 <tr>
    298      <td valign="top">Author</td>
    299      <td valign="top">Angu, Pragatheeswaran and Ramamurthy, Byrav</td>
    300 </tr>
    301 
    302 <tr>
    303      <td valign="top">Title</td>
    304      <td valign="top">Experiences with dynamic circuit creation in a regional network testbed</td>
    305 </tr>
    306 
    307 <tr>
    308      <td valign="top">Booktitle</td>
    309      <td valign="top">2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)</td>
    310 </tr>
    311 
    312 <tr>
    313      <td valign="top">Location</td>
    314      <td valign="top">Shanghai, China</td>
    315 </tr>
    316 
    317 <tr>
    318      <td valign="top">Publisher</td>
    319      <td valign="top">IEEE</td>
    320 </tr>
    321 
    322 <tr>
    323      <td valign="top">Year</td>
    324      <td valign="top">2011</td>
    325 </tr>
    326 
    327 <tr>
    328      <td valign="top">Abstract</td>
    329      <td valign="top">In this paper we share our experiences of enabling dynamic circuit creation in the GpENI network. GpENI is a network research testbed in the mid-west USA involving several educational institutions. University of Nebraska-Lincoln is involved in provisioning dynamic circuits across the GpENI network among its participating universities. We discuss several options investigated for deploying dynamic circuits over the GpENI network as well as our demonstration experiments at the GENI engineering conferences. UNL has also collaborated with ProtoGENI project of University of Utah and Mid-Atlantic Crossroads (MAX) facility of Washington DC to create inter-domain dynamic circuits.</td>
    330 </tr>
    331 
    332 
    333 
    334 <tr>
    335      <td valign="top">DOI</td>
    336      <td valign="top">10.1109/infcomw.2011.5928801</td>
    337 </tr>
    338 
    339 
    340 
    341 <tr>
    342      <td valign="top">URL</td>
    343      <td valign="top"><a href="http://dx.doi.org/10.1109/infcomw.2011.5928801">http://dx.doi.org/10.1109/infcomw.2011.5928801</a></td>
    344 </tr>
    345 
    346 
    347 </li>
    348 
    349 </table></div><br><br>
    350 
    351 
    352 
    353 
    354 <a class="EntryGoto" id="Araji, B. and Gurkan, D."></a>
    355 <b class="myheading" style="position: relative; left: 5%;">Araji, B. and Gurkan, D.</b>
    356 
    357 <div class="BibEntry">
    358 
    359 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    360 
    361 <li>
    362 
    363 
    364 <tr>
    365      <td valign="top">Author</td>
    366      <td valign="top">Araji, B. and Gurkan, D.</td>
    367 </tr>
    368 
    369 <tr>
    370      <td valign="top">Title</td>
    371      <td valign="top">Embedding Switch Number, Port Number, and MAC Address (ESPM) within the IPv6 Address</td>
    372 </tr>
    373 
    374 <tr>
    375      <td valign="top">Booktitle</td>
    376      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    377 </tr>
    378 
    379 <tr>
    380      <td valign="top">Publisher</td>
    381      <td valign="top">IEEE</td>
    382 </tr>
    383 
    384 <tr>
    385      <td valign="top">Year</td>
    386      <td valign="top">2014</td>
    387 </tr>
    388 
    389 <tr>
    390      <td valign="top">Abstract</td>
    391      <td valign="top">IPv4 protocol, the famous 32-bit address, has been used in networks for many decades [1] and would not have sustained its usability without NAT. IPv6 protocol with its 128-bit address, provides slight routing information [2]. In this paper, we present ESPM, Embedding Switch ID, Port number and MAC Address within IPv6 protocol and SDN technology, imposing a device connectivity hierarchy upon the address space. We amend the IPv6 global addressing scheme for hosts to include their MAC address as well as the switch ID and Switch port number that they are connected to. This scheme encodes information that would ordinarily require a lookup or query packets(ARP) and decrease CAM table entries on the switch by forwarding the packets using the ESPM algorithm. After processing ESPM algorithm to check for OF controller ID, OF switch ID, and the port ID, the amount of total packets transferred on the network to fulfill an ICMP request-reply process decreased by 28.1&#x0025; in 1-switch-2 hosts. In order to demonstrate the feasibility of such an addressing scheme, we use POF controller and POF switch [3] to emulate ESPM implementation and then measure the impact on the number of network management packets transferred between hosts during connectivity tests.</td>
    392 </tr>
    393 
    394 
    395 
    396 <tr>
    397      <td valign="top">DOI</td>
    398      <td valign="top">10.1109/gree.2014.20</td>
    399 </tr>
    400 
    401 
    402 
    403 <tr>
    404      <td valign="top">URL</td>
    405      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.20">http://dx.doi.org/10.1109/gree.2014.20</a></td>
    406 </tr>
    407 
    408 
    409 </li>
    410 
    411 </table></div><br><br>
    412 
    413 
    414 
    415 
    416 <a class="EntryGoto" id="Aug&#x65;&#x0301;, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge"></a>
    417 <b class="myheading" style="position: relative; left: 5%;">Aug&#x65;&#x0301;, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b>
    418 
    419 <div class="BibEntry">
    420 
    421 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    422 
    423 <li>
    424 
    425 
    426 <tr>
    427      <td valign="top">Author</td>
    428      <td valign="top">Aug&#x65;&#x0301;, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</td>
    429 </tr>
    430 
    431 <tr>
    432      <td valign="top">Title</td>
    433      <td valign="top">Tools to foster a global federation of testbeds</td>
    434 </tr>
    435 
    436 <tr>
    437      <td valign="top">Journal</td>
    438      <td valign="top">Computer Networks</td>
    439 </tr>
    440 
    441 <tr>
    442      <td valign="top">Year</td>
    443      <td valign="top">2014</td>
    444 </tr>
    445 
    446 <tr>
    447      <td valign="top">Abstract</td>
    448      <td valign="top">A global federation of experimental facilities in computer networking is being built on the basis of a thin waist, the Slice-based Federation Architecture (SFA), for managing testbed resources in a secure and efficient way. Its success will depend on the existence of tools that allow testbeds to expose their local resources and users to browse and select the resources most appropriate for their experiments. This paper presents two such tools. First, SFAWrap, which makes it relatively easy for a testbed owner to provide an SFA interface for their testbed. Second, MySlice, a tool that allows experimenters to browse and reserve testbed resources via SFA, and that is extensible through a system of plug-ins. Together, these tools should lower the barriers to entry for testbed owners who wish to join the global federation.</td>
    449 </tr>
    450 
    451 
    452 
    453 <tr>
    454      <td valign="top">DOI</td>
    455      <td valign="top">10.1016/j.bjp.2013.12.038</td>
    456 </tr>
    457 
    458 
    459 
    460 <tr>
    461      <td valign="top">URL</td>
    462      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.038">http://dx.doi.org/10.1016/j.bjp.2013.12.038</a></td>
    463 </tr>
    464 
    465 
    466 </li>
    467 
    468 </table></div><br><br>
    469 
    470 
    471 
    472 
    473 <a class="EntryGoto" id="Babaoglu, A. C. and Dutta, R."></a>
    474 <b class="myheading" style="position: relative; left: 5%;">Babaoglu, A. C. and Dutta, R.</b>
    475 
    476 <div class="BibEntry">
    477 
    478 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    479 
    480 <li>
    481 
    482 
    483 <tr>
    484      <td valign="top">Author</td>
    485      <td valign="top">Babaoglu, A. C. and Dutta, R.</td>
    486 </tr>
    487 
    488 <tr>
    489      <td valign="top">Title</td>
    490      <td valign="top">A GENI Meso-Scale Experiment of a Verification Service</td>
    491 </tr>
    492 
    493 <tr>
    494      <td valign="top">Booktitle</td>
    495      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    496 </tr>
    497 
    498 <tr>
    499      <td valign="top">Publisher</td>
    500      <td valign="top">IEEE</td>
    501 </tr>
    502 
    503 <tr>
    504      <td valign="top">Year</td>
    505      <td valign="top">2014</td>
    506 </tr>
    507 
    508 <tr>
    509      <td valign="top">Abstract</td>
    510      <td valign="top">In this work, we demonstrate the real world results of a verification service that verifies the performance of a set of network providers by measuring the user flows, using GENI experimental facility. We first give an overview of the architectural components and their interactions to enable such a verification capability. We then give the experiment setup details followed by the numerical results for various network measurement metrics and the evaluation of these results.</td>
    511 </tr>
    512 
    513 
    514 
    515 <tr>
    516      <td valign="top">DOI</td>
    517      <td valign="top">10.1109/gree.2014.13</td>
    518 </tr>
    519 
    520 
    521 
    522 <tr>
    523      <td valign="top">URL</td>
    524      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.13">http://dx.doi.org/10.1109/gree.2014.13</a></td>
    525 </tr>
    526 
    527 
    528 </li>
    529 
    530 </table></div><br><br>
    531 
    532 
    533 
    534 
    535 <a class="EntryGoto" id="Babaoglu, Ahmet C."></a>
    536 <b class="myheading" style="position: relative; left: 5%;">Babaoglu, Ahmet C.</b>
    537 
    538 <div class="BibEntry">
    539 
    540 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    541 
    542 <li>
    543 
    544 
    545 <tr>
    546      <td valign="top">Author</td>
    547      <td valign="top">Babaoglu, Ahmet C.</td>
    548 </tr>
    549 
    550 <tr>
    551      <td valign="top">Title</td>
    552      <td valign="top">Verification Services for the Choice-Based Internet of the Future</td>
    553 </tr>
    554 
    555 <tr>
    556      <td valign="top">Year</td>
    557      <td valign="top">2014</td>
    558 </tr>
    559 
    560 <tr>
    561      <td valign="top">Abstract</td>
    562      <td valign="top">The Internet has grown from its inception as a special-purpose internetwork into a general multi-purpose world-wide facility enabling education, commerce, governance, and societal communication, all in the space of a few decades. Over this time, and accelerating in the last decade or so, increasing demands and a growing variety of use cases are posing new challenges on the architecture prompting re-thinking and re-architecting of the network. One thread of research in such architectural considerations involves the issue of choice. The lack of alternative network services brings little economic incentive for the network service providers to make investments to deploy new technologies and improve the quality of their network services. In addition, most user flows goes through several providers, thus there is no effective mechanism in the current Internet to provide feedback to users about which provider is the cause of the performance problems they experience. One solution to these problems is to create a more competitive open market where providers can advertise their network services, and users can choose their desired set of network services to satisfy their needs. In this solution, the users have the option to choose another service if they are not satisfied. However, even in this solution, the root cause of the performance problems still can not be found and it brings us to the lack of a robust feedback capability. In this work, we investigate a solution to this fundamental missing piece of the In- ternet, the measurement and verification capability of the network services offered in the Internet, that indirectly pushes more responsibility to the network providers to fulfill their requirements for high quality services. Our work, while rooted in standard expectations of economic theory, is not in economics itself. Rather, it is in defining, designing, and realizing architectural entities and interactions in technical terms that can realize verification services essential to enabling such economic interactions. Our work is threefold; after giving a literature overview of the research on future Internet and Internet measurement, we first propose an architecture that defines the roles, interactions and design choices to enable a Choice-Based Verification Service. We then describe the results and analysis of a series of tests, which start with our work on measurement frameworks in wired and wireless environments and continue with the simulation, the mechanism introduced and the actual prototype of this work deployed into a real system, the GENI meso-scale testbed. Finally, we investigate and validate whether such informed choices with verification service actually lead to better overall results. We use energy-efficiency as a practical and useful domain for a case study and show the simulation results, which greatly increase the appeal of this work as applicable real-world network services.</td>
    563 </tr>
    564 
    565 
    566 
    567 
    568 
    569 <tr>
    570      <td valign="top">URL</td>
    571      <td valign="top"><a href="http://www.lib.ncsu.edu/resolver/1840.16/9336">http://www.lib.ncsu.edu/resolver/1840.16/9336</a></td>
    572 </tr>
    573 
    574 
    575 </li>
    576 
    577 </table></div><br><br>
    578 
    579 
    580 
    581 
    582 <a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David"></a>
    583 <b class="myheading" style="position: relative; left: 5%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</b>
    584 
    585 <div class="BibEntry">
    586 
    587 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    588 
    589 <li>
    590 
    591 
    592 <tr>
    593      <td valign="top">Author</td>
    594      <td valign="top">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</td>
    595 </tr>
    596 
    597 <tr>
    598      <td valign="top">Title</td>
    599      <td valign="top">Networked cloud orchestration: A GENI perspective</td>
    600 </tr>
    601 
    602 <tr>
    603      <td valign="top">Booktitle</td>
    604      <td valign="top">2010 IEEE Globecom Workshops</td>
    605 </tr>
    606 
    607 <tr>
    608      <td valign="top">Location</td>
    609      <td valign="top">Miami, FL, USA</td>
    610 </tr>
    611 
    612 <tr>
    613      <td valign="top">Publisher</td>
    614      <td valign="top">IEEE</td>
    615 </tr>
    616 
    617 <tr>
    618      <td valign="top">Year</td>
    619      <td valign="top">2010</td>
    620 </tr>
    621 
    622 <tr>
    623      <td valign="top">Abstract</td>
    624      <td valign="top">This paper describes the experience of developing a system for creation of distributed linked configurations of heterogeneous resources (slices) in GENI. Our work leverages a number of unique architectural solutions (distributed architecture, declarative resource specifications, unique approach to slice instantiation) which is applicable to a wider set of problems related to autonomic co-scheduling and provisioning of heterogeneous networked resources. We discuss the architecture, the resource description mechanisms and some of the algorithms used to enable our system. We conclude with an analysis of a real experiment at allocating resources from multiple providers across a very wide geographic area (spanning Massachusetts, Illinois and North Carolina) to create a single private Layer 2 network connecting virtual machines on the campus of Duke University to a sensor testbed at University of Massachusetts, Amherst.</td>
    625 </tr>
    626 
    627 
    628 
    629 <tr>
    630      <td valign="top">DOI</td>
    631      <td valign="top">10.1109/GLOCOMW.2010.5700385</td>
    632 </tr>
    633 
    634 
    635 
    636 <tr>
    637      <td valign="top">URL</td>
    638      <td valign="top"><a href="http://dx.doi.org/10.1109/GLOCOMW.2010.5700385">http://dx.doi.org/10.1109/GLOCOMW.2010.5700385</a></td>
    639 </tr>
    640 
    641 
    642 </li>
    643 
    644 </table></div><br><br>
    645 
    646 
    647 
    648 
    649 <a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff"></a>
    650 <b class="myheading" style="position: relative; left: 5%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff</b>
    651 
    652 <div class="BibEntry">
    653 
    654 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    655 
    656 <li>
    657 
    658 
    659 <tr>
    660      <td valign="top">Author</td>
    661      <td valign="top">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Ruth, Paul and Yumerefendi, Aydan and Chase, Jeff</td>
    662 </tr>
    663 
    664 <tr>
    665      <td valign="top">Title</td>
    666      <td valign="top">ExoGENI: A Multi-Domain Infrastructure-as-a-Service Testbed</td>
    667 </tr>
    668 
    669 <tr>
    670      <td valign="top">Booktitle</td>
    671      <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
    672 </tr>
    673 
    674 <tr>
    675      <td valign="top">Year</td>
    676      <td valign="top">2012</td>
    677 </tr>
    678 
    679 <tr>
    680      <td valign="top">Abstract</td>
    681      <td valign="top">NSF's GENI program seeks to enable experiments that run within virtual network topologies built-to-order from testbed infrastructure offered by multiple providers (domains). GENI is often viewed as a network testbed integration effort, but behind it is an ambitious vision for multi-domain infrastructure-as-a-service (IaaS). This paper presents ExoGENI, a new GENI testbed that links GENI to two advances in virtual infrastructure services outside of GENI: open cloud computing (OpenStack) and dynamic circuit fabrics. ExoGENI orchestrates a federation of independent cloud sites and circuit providers through their native IaaS interfaces, and links them to other GENI tools and resources. The ExoGENI deployment consists of cloud site ``racks'' on host campuses within the US, linked with national research networks and other circuit networks through programmable exchange points. The ExoGENI sites and control software are enabled for software-defined networking using OpenFlow. ExoGENI offers a powerful unified hosting platform for deeply networked, multi-domain, multi-site cloud applications. We intend that ExoGENI will seed a larger, evolving platform linking other third-party cloud sites, transport networks, and other infrastructure services, and that it will enable real-world deployment of innovative distributed services and new visions of a Future Internet.</td>
    682 </tr>
    683 
    684 
    685 
    686 
    687 
    688 
    689 </li>
    690 
    691 </table></div><br><br>
    692 
    693 
    694 
    695 
    696 <a class="EntryGoto" id="Bastin, Nicholas and Bavier, Andy and Blaine, Jessica and Chen, Jim and Krishnan, Narayan and Mambretti, Joe and McGeer, Rick and Ricci, Rob and Watts, Nicki"></a>
    697 <b class="myheading" style="position: relative; left: 5%;">Bastin, Nicholas and Bavier, Andy and Blaine, Jessica and Chen, Jim and Krishnan, Narayan and Mambretti, Joe and McGeer, Rick and Ricci, Rob and Watts, Nicki</b>
    698 
    699 <div class="BibEntry">
    700 
    701 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    702 
    703 <li>
    704 
    705 
    706 <tr>
    707      <td valign="top">Author</td>
    708      <td valign="top">Bastin, Nicholas and Bavier, Andy and Blaine, Jessica and Chen, Jim and Krishnan, Narayan and Mambretti, Joe and McGeer, Rick and Ricci, Rob and Watts, Nicki</td>
    709 </tr>
    710 
    711 <tr>
    712      <td valign="top">Title</td>
    713      <td valign="top">The InstaGENI initiative: An architecture for distributed systems and advanced programmable networks</td>
    714 </tr>
    715 
    716 <tr>
    717      <td valign="top">Journal</td>
    718      <td valign="top">Computer Networks</td>
    719 </tr>
    720 
    721 <tr>
    722      <td valign="top">Year</td>
    723      <td valign="top">2014</td>
    724 </tr>
    725 
    726 <tr>
    727      <td valign="top">Abstract</td>
    728      <td valign="top">In this paper, we describe InstaGENI, a distributed cloud based on programmable networks designed for the GENI Mesoscale deployment and large-scale distributed research projects. The InstaGENI architecture closely integrates a lightweight cluster design with software-defined networking, Hardware-as-a-Service and Containers-as-a-Service, remote monitoring and management, and high-performance inter-site networking. The initial InstaGENI deployment will encompass 34 sites across the United States, interconnected through a specialized GENI backbone network deployed over national, regional and campus research and education networks, with international network extensions to sites across the world.</td>
    729 </tr>
    730 
    731 
    732 
    733 <tr>
    734      <td valign="top">DOI</td>
    735      <td valign="top">10.1016/j.bjp.2013.12.034</td>
    736 </tr>
    737 
    738 
    739 
    740 <tr>
    741      <td valign="top">URL</td>
    742      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.034">http://dx.doi.org/10.1016/j.bjp.2013.12.034</a></td>
    743 </tr>
    744 
    745 
    746 </li>
    747 
    748 </table></div><br><br>
    749 
    750 
    751 
    752 
    753 <a class="EntryGoto" id="Bavier, Andy and Chen, Jim and Mambretti, Joe and McGeer, Rick and McGeer, Sean and Nelson, Jude and O'Connell, Patrick and Ricart, Glenn and Tredger, Stephen and Coady, Yvonne"></a>
    754 <b class="myheading" style="position: relative; left: 5%;">Bavier, Andy and Chen, Jim and Mambretti, Joe and McGeer, Rick and McGeer, Sean and Nelson, Jude and O'Connell, Patrick and Ricart, Glenn and Tredger, Stephen and Coady, Yvonne</b>
    755 
    756 <div class="BibEntry">
    757 
    758 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    759 
    760 <li>
    761 
    762 
    763 <tr>
    764      <td valign="top">Author</td>
    765      <td valign="top">Bavier, Andy and Chen, Jim and Mambretti, Joe and McGeer, Rick and McGeer, Sean and Nelson, Jude and O'Connell, Patrick and Ricart, Glenn and Tredger, Stephen and Coady, Yvonne</td>
    766 </tr>
    767 
    768 <tr>
    769      <td valign="top">Title</td>
    770      <td valign="top">The GENI experiment engine</td>
    771 </tr>
    772 
    773 <tr>
    774      <td valign="top">Booktitle</td>
    775      <td valign="top">Teletraffic Congress (ITC), 2014 26th International</td>
    776 </tr>
    777 
    778 <tr>
    779      <td valign="top">Publisher</td>
    780      <td valign="top">IEEE</td>
    781 </tr>
    782 
    783 <tr>
    784      <td valign="top">Year</td>
    785      <td valign="top">2014</td>
    786 </tr>
    787 
    788 <tr>
    789      <td valign="top">Abstract</td>
    790      <td valign="top">We describe the GENI Experiment Engine, a Distributed-Platform-as-a-Service facility designed to be implemented on a distributed testbed or infrastructure. The GEE is intended to provide rapid and convenient access to a distributed infrastructure for simple, easy-to-configure experiments and applications. Specifically, the design goal of the GEE is to permit experimenters and application writers to: (a) allocate a GEE slicelet; (b) deploy a simple experiment or application; (c) run the experiment; (d) collect the results; and (e) tear down the experiment, starting from scratch, within five minutes. The GEE consists of four cooperating services over the GENI infrastructure, which together with pre-allocated slicelets and a pre-allocated network offers a complete, ready to use, sliceable platform over the GENI Infrastructure.</td>
    791 </tr>
    792 
    793 
    794 
    795 <tr>
    796      <td valign="top">DOI</td>
    797      <td valign="top">10.1109/itc.2014.6932974</td>
    798 </tr>
    799 
    800 
    801 
    802 <tr>
    803      <td valign="top">URL</td>
    804      <td valign="top"><a href="http://dx.doi.org/10.1109/itc.2014.6932974">http://dx.doi.org/10.1109/itc.2014.6932974</a></td>
    805 </tr>
    806 
    807 
    808 </li>
    809 
    810 </table></div><br><br>
    811 
    812 
    813 
    814 
    815 <a class="EntryGoto" id="Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco"></a>
    816 <b class="myheading" style="position: relative; left: 5%;">Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco</b>
    817 
    818 <div class="BibEntry">
    819 
    820 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    821 
    822 <li>
    823 
    824 
    825 <tr>
    826      <td valign="top">Author</td>
    827      <td valign="top">Bavier, Andy and Coady, Yvonne and Mack, Tony and Matthews, Chris and Mambretti, Joe and McGeer, Rick and Mueller, Paul and Snoeren, Alex and Yuen, Marco</td>
    828 </tr>
    829 
    830 <tr>
    831      <td valign="top">Title</td>
    832      <td valign="top">GENICloud and transcloud</td>
    833 </tr>
    834 
    835 <tr>
    836      <td valign="top">Booktitle</td>
    837      <td valign="top">Proceedings of the 2012 workshop on Cloud services, federation, and the 8th open cirrus summit</td>
    838 </tr>
    839 
    840 <tr>
    841      <td valign="top">Location</td>
    842      <td valign="top">San Jose, California, USA</td>
    843 </tr>
    844 
    845 <tr>
    846      <td valign="top">Publisher</td>
    847      <td valign="top">ACM</td>
    848 </tr>
    849 
    850 <tr>
    851      <td valign="top">Address</td>
    852      <td valign="top">New York, NY, USA</td>
    853 </tr>
    854 
    855 <tr>
    856      <td valign="top">Year</td>
    857      <td valign="top">2012</td>
    858 </tr>
    859 
    860 <tr>
    861      <td valign="top">Abstract</td>
    862      <td valign="top">In this paper, we argue that federation of cloud systems requires a standard API for users to create, manage, and destroy virtual objects, and a standard naming scheme for virtual objects. We introduce an existing API for this purpose, the Slice-Based Federation Architecture, and demonstrate that it can be implemented on a number of existing cloud management systems. We introduce a simple naming scheme for virtual objects, and discuss its implementation.</td>
    863 </tr>
    864 
    865 
    866 
    867 <tr>
    868      <td valign="top">DOI</td>
    869      <td valign="top">10.1145/2378975.2378980</td>
    870 </tr>
    871 
    872 
    873 
    874 <tr>
    875      <td valign="top">URL</td>
    876      <td valign="top"><a href="http://dx.doi.org/10.1145/2378975.2378980">http://dx.doi.org/10.1145/2378975.2378980</a></td>
    877 </tr>
    878 
    879 
    880 </li>
    881 
    882 </table></div><br><br>
    883 
    884 
    885 
    886 
    887 <a class="EntryGoto" id="Bejerano, Y. and Ferragut, J. and Guo, K. and Gupta, V. and Gutterman, C. and Nandagopal, T. and Zussman, G."></a>
    888 <b class="myheading" style="position: relative; left: 5%;">Bejerano, Y. and Ferragut, J. and Guo, K. and Gupta, V. and Gutterman, C. and Nandagopal, T. and Zussman, G.</b>
    889 
    890 <div class="BibEntry">
    891 
    892 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    893 
    894 <li>
    895 
    896 
    897 <tr>
    898      <td valign="top">Author</td>
    899      <td valign="top">Bejerano, Y. and Ferragut, J. and Guo, K. and Gupta, V. and Gutterman, C. and Nandagopal, T. and Zussman, G.</td>
    900 </tr>
    901 
    902 <tr>
    903      <td valign="top">Title</td>
    904      <td valign="top">Experimental Evaluation of a Scalable WiFi Multicast Scheme in the ORBIT Testbed</td>
    905 </tr>
    906 
    907 <tr>
    908      <td valign="top">Booktitle</td>
    909      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    910 </tr>
    911 
    912 <tr>
    913      <td valign="top">Publisher</td>
    914      <td valign="top">IEEE</td>
    915 </tr>
    916 
    917 <tr>
    918      <td valign="top">Year</td>
    919      <td valign="top">2014</td>
    920 </tr>
    921 
    922 <tr>
    923      <td valign="top">Abstract</td>
    924      <td valign="top">IEEE 802.11-based wireless local area networks, referred to as WiFi, have been globally deployed and the vast majority of the mobile devices are currently WiFi-enabled. While WiFi has been proposed for multimedia content distribution, its lack of adequate support for multicast services hinders its ability to provide multimedia content distribution to a large number of devices. In earlier work, we proposed a dynamic scheme called AMuSe that selects a subset of the multicast receivers as feedback nodes. The feedback nodes periodically send information about channel quality to the multicast sender and the sender in turn can optimize multicast service quality, e.g., by dynamically adjusting transmission bit-rate. In this paper, we discuss several experimental results for the performance evaluation of AMuSe. Our experiments use more than 250 nodes placed in a grid topology in the ORBIT testbed. We consider different experimental scenarios: with and without the presence of external noise. Our focus is on studying the performance of WiFi nodes in WiFi multicast and establishing the conditions that make AMuSe an attractive scheme for feedback in WiFi multicast.</td>
    925 </tr>
    926 
    927 
    928 
    929 <tr>
    930      <td valign="top">DOI</td>
    931      <td valign="top">10.1109/gree.2014.22</td>
    932 </tr>
    933 
    934 
    935 
    936 <tr>
    937      <td valign="top">URL</td>
    938      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.22">http://dx.doi.org/10.1109/gree.2014.22</a></td>
    939 </tr>
    940 
    941 
    942 </li>
    943 
    944 </table></div><br><br>
    945 
    946 
    947 
    948 
    949 <a class="EntryGoto" id="Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan"></a>
    950 <b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</b>
    951 
    952 <div class="BibEntry">
    953 
    954 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    955 
    956 <li>
    957 
    958 
    959 <tr>
    960      <td valign="top">Author</td>
    961      <td valign="top">Berman, Mark and Chase, Jeffrey S. and Landweber, Lawrence and Nakao, Akihiro and Ott, Max and Raychaudhuri, Dipankar and Ricci, Robert and Seskar, Ivan</td>
    962 </tr>
    963 
    964 <tr>
    965      <td valign="top">Title</td>
    966      <td valign="top">GENI: A federated testbed for innovative network experiments</td>
    967 </tr>
    968 
    969 <tr>
    970      <td valign="top">Journal</td>
    971      <td valign="top">Computer Networks</td>
    972 </tr>
    973 
    974 <tr>
    975      <td valign="top">Year</td>
    976      <td valign="top">2014</td>
    977 </tr>
    978 
    979 <tr>
    980      <td valign="top">Abstract</td>
    981      <td valign="top">GENI, the Global Environment for Networking Innovation, is a distributed virtual laboratory for transformative, at-scale experiments in network science, services, and security. Designed in response to concerns over Internet ossification, GENI is enabling a wide variety of experiments in a range of areas, including clean-slate networking, protocol design and evaluation, distributed service offerings, social network integration, content management, and in-network service deployment. Recently, GENI has been leading an effort to explore the potential of its underlying technologies, SDN and GENI racks, in support of university campus network management and applications. With the concurrent deployment of these technologies on regional and national R&#x0026;E backbones, this will result in a revolutionary new national-scale distributed architecture, bringing to the entire network the shared, deeply programmable environment that the cloud has brought to the datacenter. This deeply programmable environment will support the GENI research mission and as well as enabling research in a wide variety of application areas.</td>
    982 </tr>
    983 
    984 
    985 
    986 <tr>
    987      <td valign="top">DOI</td>
    988      <td valign="top">10.1016/j.bjp.2013.12.037</td>
    989 </tr>
    990 
    991 
    992 
    993 <tr>
    994      <td valign="top">URL</td>
    995      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.037">http://dx.doi.org/10.1016/j.bjp.2013.12.037</a></td>
    996 </tr>
    997 
    998 
    999 </li>
    1000 
    1001 </table></div><br><br>
    1002 
    1003 
    1004 
    1005 
    1006 <a class="EntryGoto" id="Berman, Mark and Elliott, Chip and Landweber, Lawrence"></a>
    1007 <b class="myheading" style="position: relative; left: 5%;">Berman, Mark and Elliott, Chip and Landweber, Lawrence</b>
    1008 
    1009 <div class="BibEntry">
    1010 
    1011 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1012 
    1013 <li>
    1014 
    1015 
    1016 <tr>
    1017      <td valign="top">Author</td>
    1018      <td valign="top">Berman, Mark and Elliott, Chip and Landweber, Lawrence</td>
    1019 </tr>
    1020 
    1021 <tr>
    1022      <td valign="top">Title</td>
    1023      <td valign="top">GENI: Large-Scale Distributed Infrastructure for Networking and Distributed Systems Research</td>
    1024 </tr>
    1025 
    1026 <tr>
    1027      <td valign="top">Booktitle</td>
    1028      <td valign="top">2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)</td>
    1029 </tr>
    1030 
    1031 <tr>
    1032      <td valign="top">Location</td>
    1033      <td valign="top">Da Nang, Vietnam</td>
    1034 </tr>
    1035 
    1036 <tr>
    1037      <td valign="top">Year</td>
    1038      <td valign="top">2014</td>
    1039 </tr>
    1040 
    1041 <tr>
    1042      <td valign="top">Abstract</td>
    1043      <td valign="top">GENI, the Global Environment for Networking Innovation, is a distributed virtual laboratory for research in networking and distributed systems, with applications in domain science. The main components of GENI include OpenFlow-enabled software defined networking (SDN) resources deployed on over 40 university campuses across the U.S. These resources include both switches and GENI Racks (SDN capable compute clusters with OpenFlow switches for internal and external communications). GENI Racks are currently installed on dozens of university campuses and within R&#x0026;E network backbones. Also available is a diverse group of programmable computing and wireless networking resources. Researchers access this collection of resources via the key GENI techniques of deep programmability and slicing. Collectively, these resources and methods enable GENI to support a wide variety of research efforts.</td>
    1044 </tr>
    1045 
    1046 
    1047 
    1048 <tr>
    1049      <td valign="top">DOI</td>
    1050      <td valign="top">10.1109/CCE.2014.6916696</td>
    1051 </tr>
    1052 
    1053 
    1054 
    1055 <tr>
    1056      <td valign="top">URL</td>
    1057      <td valign="top"><a href="http://dx.doi.org/10.1109/CCE.2014.6916696">http://dx.doi.org/10.1109/CCE.2014.6916696</a></td>
    1058 </tr>
    1059 
    1060 
    1061 </li>
    1062 
    1063 </table></div><br><br>
    1064 
    1065 
    1066 
    1067 
    1068 <a class="EntryGoto" id="Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas"></a>
    1069 <b class="myheading" style="position: relative; left: 5%;">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</b>
    1070 
    1071 <div class="BibEntry">
    1072 
    1073 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1074 
    1075 <li>
    1076 
    1077 
    1078 <tr>
    1079      <td valign="top">Author</td>
    1080      <td valign="top">Berryman, Alex and Calyam, Prasad and Cecil, Joe and Adams, George B. and Comer, Douglas</td>
    1081 </tr>
    1082 
    1083 <tr>
    1084      <td valign="top">Title</td>
    1085      <td valign="top">Advanced Manufacturing Use Cases and Early Results in GENI Infrastructure</td>
    1086 </tr>
    1087 
    1088 <tr>
    1089      <td valign="top">Booktitle</td>
    1090      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    1091 </tr>
    1092 
    1093 <tr>
    1094      <td valign="top">Location</td>
    1095      <td valign="top">Salt Lake City, UT</td>
    1096 </tr>
    1097 
    1098 <tr>
    1099      <td valign="top">Publisher</td>
    1100      <td valign="top">IEEE</td>
    1101 </tr>
    1102 
    1103 <tr>
    1104      <td valign="top">Year</td>
    1105      <td valign="top">2013</td>
    1106 </tr>
    1107 
    1108 
    1109 
    1110 <tr>
    1111      <td valign="top">DOI</td>
    1112      <td valign="top">10.1109/GREE.2013.13</td>
    1113 </tr>
    1114 
    1115 
    1116 
    1117 <tr>
    1118      <td valign="top">URL</td>
    1119      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.13">http://dx.doi.org/10.1109/GREE.2013.13</a></td>
    1120 </tr>
    1121 
    1122 
    1123 </li>
    1124 
    1125 </table></div><br><br>
    1126 
    1127 
    1128 
    1129 
    1130 <a class="EntryGoto" id="Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D."></a>
    1131 <b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</b>
    1132 
    1133 <div class="BibEntry">
    1134 
    1135 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1136 
    1137 <li>
    1138 
    1139 
    1140 <tr>
    1141      <td valign="top">Author</td>
    1142      <td valign="top">Bhanage, G. and Daya, R. and Seskar, I. and Raychaudhuri, D.</td>
    1143 </tr>
    1144 
    1145 <tr>
    1146      <td valign="top">Title</td>
    1147      <td valign="top">VNTS: A Virtual Network Traffic Shaper for Air Time Fairness in 802.16e Systems</td>
    1148 </tr>
    1149 
    1150 <tr>
    1151      <td valign="top">Booktitle</td>
    1152      <td valign="top">Communications (ICC), 2010 IEEE International Conference on</td>
    1153 </tr>
    1154 
    1155 <tr>
    1156      <td valign="top">Publisher</td>
    1157      <td valign="top">IEEE</td>
    1158 </tr>
    1159 
    1160 <tr>
    1161      <td valign="top">Year</td>
    1162      <td valign="top">2010</td>
    1163 </tr>
    1164 
    1165 <tr>
    1166      <td valign="top">Abstract</td>
    1167      <td valign="top">The 802.16e standard for broadband wireless access mandates the presence of QoS classes, but does not specify guidelines for the scheduler implementation or mechanisms to ensure air time fairness. Our study demonstrates the feasibility of controlling downlink airtime fairness for slices while running above a proprietary WiMAX basestation (BS) scheduler. We design and implement a virtualized infrastructure that allows users to obtain at least an allocated percentage of BS resources in the presence of saturation and link degradation. Using Kernel virtual machines for creating slices and Click modular router for implementing the virtual network traffic shaping engine we show that it is possible to adaptively control slice usage for downlink traffic on a WiMAX Basestation. The fairness index and coupling coefficient show an improvement of up to 42&#x0025;, and 73&#x0025; with preliminary indoor walking mobility experiments. Outdoor vehicular measurements show an improvement of up to 27&#x0025;, and 70\\\\ with the fairness index and coupling coefficient respectively</td>
    1168 </tr>
    1169 
    1170 
    1171 
    1172 <tr>
    1173      <td valign="top">DOI</td>
    1174      <td valign="top">10.1109/ICC.2010.5502484</td>
    1175 </tr>
    1176 
    1177 
    1178 
    1179 <tr>
    1180      <td valign="top">URL</td>
    1181      <td valign="top"><a href="http://dx.doi.org/10.1109/ICC.2010.5502484">http://dx.doi.org/10.1109/ICC.2010.5502484</a></td>
    1182 </tr>
    1183 
    1184 
    1185 </li>
    1186 
    1187 </table></div><br><br>
    1188 
    1189 
    1190 
    1191 
    1192 <a class="EntryGoto" id="Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S."></a>
    1193 <b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</b>
    1194 
    1195 <div class="BibEntry">
    1196 
    1197 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1198 
    1199 <li>
    1200 
    1201 
    1202 <tr>
    1203      <td valign="top">Author</td>
    1204      <td valign="top">Bhanage, G. and Seskar, I. and Zhang, Y. and Raychaudhuri, D. and Jain, S.</td>
    1205 </tr>
    1206 
    1207 <tr>
    1208      <td valign="top">Title</td>
    1209      <td valign="top">Experimental evaluation of openvz from a testbed deployment perspective</td>
    1210 </tr>
    1211 
    1212 <tr>
    1213      <td valign="top">Journal</td>
    1214      <td valign="top">Proceedings of the ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)</td>
    1215 </tr>
    1216 
    1217 <tr>
    1218      <td valign="top">Year</td>
    1219      <td valign="top">2010</td>
    1220 </tr>
    1221 
    1222 
    1223 
    1224 <tr>
    1225      <td valign="top">DOI</td>
    1226      <td valign="top">10.1007/978-3-642-17851-1&#x005F;7</td>
    1227 </tr>
    1228 
    1229 
    1230 
    1231 <tr>
    1232      <td valign="top">URL</td>
    1233      <td valign="top"><a href="http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7">http://dx.doi.org/10.1007/978-3-642-17851-1&#x005F;7</a></td>
    1234 </tr>
    1235 
    1236 
    1237 </li>
    1238 
    1239 </table></div><br><br>
    1240 
    1241 
    1242 
    1243 
    1244 <a class="EntryGoto" id="Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D."></a>
    1245 <b class="myheading" style="position: relative; left: 5%;">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</b>
    1246 
    1247 <div class="BibEntry">
    1248 
    1249 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1250 
    1251 <li>
    1252 
    1253 
    1254 <tr>
    1255      <td valign="top">Author</td>
    1256      <td valign="top">Bhanage, G. and Vete, D. and Seskar, I. and Raychaudhuri, D.</td>
    1257 </tr>
    1258 
    1259 <tr>
    1260      <td valign="top">Title</td>
    1261      <td valign="top">SplitAP: Leveraging Wireless Network Virtualization for Flexible Sharing of WLANs</td>
    1262 </tr>
    1263 
    1264 <tr>
    1265      <td valign="top">Booktitle</td>
    1266      <td valign="top">Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE</td>
    1267 </tr>
    1268 
    1269 <tr>
    1270      <td valign="top">Publisher</td>
    1271      <td valign="top">IEEE</td>
    1272 </tr>
    1273 
    1274 <tr>
    1275      <td valign="top">Year</td>
    1276      <td valign="top">2010</td>
    1277 </tr>
    1278 
    1279 <tr>
    1280      <td valign="top">Abstract</td>
    1281      <td valign="top">Providing air-time guarantees across a group of clients forms a fundamental building block in sharing an access point (AP) across different virtual network providers. Though this problem has a relatively simple solution for downlink group scheduling through traffic engineering at the AP, solving this problem for uplink (UL) traffic presents a challenge for fair sharing of wireless hotspots. Among other issues, the mechanism for uplink traffic control has to scale across a large user base, and provide flexible operation irrespective of the client channel conditions and network loads. In this study, we propose the SplitAP architecture that address the problem of sharing uplink airtime across groups of users by extending the idea of network virtualization. Our architecture allows us to deploy different algorithms for enforcing UL airtime fairness across client groups. In this study, we will highlight the design features of the SplitAP architecture, and present results from evaluation on a prototype deployed with: (1) LPFC and (2) LPFC+, two algorithms for controlling UL group fairness. Performance comparisons on the ORBIT testbed show that the proposed algorithms are capable of providing group air-time fairness across wireless clients irrespective of the network volume, and traffic type. The algorithms show up to 40&#x0025; improvement with a modified Jain fairness index.</td>
    1282 </tr>
    1283 
    1284 
    1285 
    1286 <tr>
    1287      <td valign="top">DOI</td>
    1288      <td valign="top">10.1109/GLOCOM.2010.5684328</td>
    1289 </tr>
    1290 
    1291 
    1292 
    1293 <tr>
    1294      <td valign="top">URL</td>
    1295      <td valign="top"><a href="http://dx.doi.org/10.1109/GLOCOM.2010.5684328">http://dx.doi.org/10.1109/GLOCOM.2010.5684328</a></td>
    1296 </tr>
    1297 
    1298 
    1299 </li>
    1300 
    1301 </table></div><br><br>
    1302 
    1303 
    1304 
    1305 
    1306 <a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar"></a>
    1307 <b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</b>
    1308 
    1309 <div class="BibEntry">
    1310 
    1311 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1312 
    1313 <li>
    1314 
    1315 
    1316 <tr>
    1317      <td valign="top">Author</td>
    1318      <td valign="top">Bhanage, Gautam and Seskar, Ivan and Mahindra, Rajesh and Raychaudhuri, Dipankar</td>
    1319 </tr>
    1320 
    1321 <tr>
    1322      <td valign="top">Title</td>
    1323      <td valign="top">Virtual basestation: architecture for an open shared WiMAX framework</td>
    1324 </tr>
    1325 
    1326 <tr>
    1327      <td valign="top">Booktitle</td>
    1328      <td valign="top">Proceedings of the second ACM SIGCOMM workshop on Virtualized infrastructure systems and architectures</td>
    1329 </tr>
    1330 
    1331 <tr>
    1332      <td valign="top">Location</td>
    1333      <td valign="top">New Delhi, India</td>
    1334 </tr>
    1335 
    1336 <tr>
    1337      <td valign="top">Publisher</td>
    1338      <td valign="top">ACM</td>
    1339 </tr>
    1340 
    1341 <tr>
    1342      <td valign="top">Address</td>
    1343      <td valign="top">New York, NY, USA</td>
    1344 </tr>
    1345 
    1346 <tr>
    1347      <td valign="top">Year</td>
    1348      <td valign="top">2010</td>
    1349 </tr>
    1350 
    1351 <tr>
    1352      <td valign="top">Abstract</td>
    1353      <td valign="top">This paper presents the architecture and performance evaluation of a virtualized wide-area &#x34;&#x0308;G&#x20;&#x0308;cellular wireless network. Specifically, it addresses the challenges of virtualization of resources in a cellular base station to enable shared use by multiple independent slice users (experimenters or mobile virtual network operators), each with possibly distinct flow types and network layer protocols. The proposed virtual basestation architecture is based on an external substrate which uses a layer-2 switched datapath, and an arbitrated control path to the WiMAX basestation. The framework implements virtualization of base station's radio resources to achieve isolation between multiple virtual networks. An algorithm for weighted fair sharing among multiple slices based on an airtime fairness metric has been implemented for the first release. Preliminary experimental results from the virtual basestation prototype are given, demonstrating mobile network performance, isolation across slices with different flow types, and custom flow scheduling capabilities.</td>
    1354 </tr>
    1355 
    1356 
    1357 
    1358 <tr>
    1359      <td valign="top">DOI</td>
    1360      <td valign="top">10.1145/1851399.1851401</td>
    1361 </tr>
    1362 
    1363 
    1364 
    1365 <tr>
    1366      <td valign="top">URL</td>
    1367      <td valign="top"><a href="http://dx.doi.org/10.1145/1851399.1851401">http://dx.doi.org/10.1145/1851399.1851401</a></td>
    1368 </tr>
    1369 
    1370 
    1371 </li>
    1372 
    1373 </table></div><br><br>
    1374 
    1375 
    1376 
    1377 
    1378 <a class="EntryGoto" id="Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar"></a>
    1379 <b class="myheading" style="position: relative; left: 5%;">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</b>
    1380 
    1381 <div class="BibEntry">
    1382 
    1383 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1384 
    1385 <li>
    1386 
    1387 
    1388 <tr>
    1389      <td valign="top">Author</td>
    1390      <td valign="top">Bhanage, Gautam and Seskar, Ivan and Raychaudhuri, Dipankar</td>
    1391 </tr>
    1392 
    1393 <tr>
    1394      <td valign="top">Title</td>
    1395      <td valign="top">A virtualization architecture for mobile WiMAX networks</td>
    1396 </tr>
    1397 
    1398 <tr>
    1399      <td valign="top">Journal</td>
    1400      <td valign="top">SIGMOBILE Mob. Comput. Commun. Rev.</td>
    1401 </tr>
    1402 
    1403 <tr>
    1404      <td valign="top">Publisher</td>
    1405      <td valign="top">ACM</td>
    1406 </tr>
    1407 
    1408 <tr>
    1409      <td valign="top">Address</td>
    1410      <td valign="top">New York, NY, USA</td>
    1411 </tr>
    1412 
    1413 <tr>
    1414      <td valign="top">Year</td>
    1415      <td valign="top">2012</td>
    1416 </tr>
    1417 
    1418 <tr>
    1419      <td valign="top">Abstract</td>
    1420      <td valign="top">Systems virtualization offers convenient means for sharing networking infrastructure while improving its utilization. This study addresses the challenges of virtualizing a commercial off-the-shelf 4G mobileWiMAX basestation. We highlight additions and modifications needed in theWiMAX network architecture for supporting multiple simultaneous virtual basestations on a single physical basestation. The most prominent features provided by the proposed virtual basestation framework include the capability to perform all frame switching at layer-2, and control mechanisms to provide isolation across slices needed to ensure experiment repeatability. By prototyping on a commercial WiMAX radio, this paper shows the usage of the virtual basestation system for housing mobile virtual network operators and testbeds alike. A use case is shown where the virtual basestation design is used to evaluate mobile handoff schemes. Another usage case is shown for optimizing a video delivery on the edge. The video delivery use case is used to show performance improvements of up to 5dB in the PSNR. Evaluation of prototype shows a significant improvement in the slice isolation, with aggregate throughput improvements of up to 192&#x0025; achievable through fair resource allocation.</td>
    1421 </tr>
    1422 
    1423 
    1424 
    1425 <tr>
    1426      <td valign="top">DOI</td>
    1427      <td valign="top">10.1145/2169077.2169082</td>
    1428 </tr>
    1429 
    1430 
    1431 
    1432 <tr>
    1433      <td valign="top">URL</td>
    1434      <td valign="top"><a href="http://dx.doi.org/10.1145/2169077.2169082">http://dx.doi.org/10.1145/2169077.2169082</a></td>
    1435 </tr>
    1436 
    1437 
    1438 </li>
    1439 
    1440 </table></div><br><br>
    1441 
    1442 
    1443 
    1444 
    1445 <a class="EntryGoto" id="Bhat, Divyashri and Riga, Niky and Zink, Michael"></a>
    1446 <b class="myheading" style="position: relative; left: 5%;">Bhat, Divyashri and Riga, Niky and Zink, Michael</b>
    1447 
    1448 <div class="BibEntry">
    1449 
    1450 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1451 
    1452 <li>
    1453 
    1454 
    1455 <tr>
    1456      <td valign="top">Author</td>
    1457      <td valign="top">Bhat, Divyashri and Riga, Niky and Zink, Michael</td>
    1458 </tr>
    1459 
    1460 <tr>
    1461      <td valign="top">Title</td>
    1462      <td valign="top">Towards seamless application delivery using software defined exchanges</td>
    1463 </tr>
    1464 
    1465 <tr>
    1466      <td valign="top">Booktitle</td>
    1467      <td valign="top">Teletraffic Congress (ITC), 2014 26th International</td>
    1468 </tr>
    1469 
    1470 <tr>
    1471      <td valign="top">Publisher</td>
    1472      <td valign="top">IEEE</td>
    1473 </tr>
    1474 
    1475 <tr>
    1476      <td valign="top">Year</td>
    1477      <td valign="top">2014</td>
    1478 </tr>
    1479 
    1480 <tr>
    1481      <td valign="top">Abstract</td>
    1482      <td valign="top">Content Delivery over the Internet continues to be a challenge as there is no centralized control system [1]. Software Defined Networking has paved the way to provide this control of network traffic. OpenFlow is now being standardized as part of the Open Networking Foundation, and Software Defined Exchange provides a framework to use OpenFlow for multidomain routing. Prototype deployments of Software Defined Exchanges have recently come into existence as a platform for Future Internet architecture to eliminate the need for core routing technology used in today's Internet. In this paper, we look at how application delivery, in particular, Dynamic Adaptive Streaming over HTTP (DASH) and Nowcasting take advantage of Software Defined Exchange. We compare unsophisticated controllers to more sophisticated ones which we call a ” load balancer” and find that implementing a good reactive controller for inter-domain routing can result in better network utilization and better application performance.</td>
    1483 </tr>
    1484 
    1485 
    1486 
    1487 <tr>
    1488      <td valign="top">DOI</td>
    1489      <td valign="top">10.1109/itc.2014.6932971</td>
    1490 </tr>
    1491 
    1492 
    1493 
    1494 <tr>
    1495      <td valign="top">URL</td>
    1496      <td valign="top"><a href="http://dx.doi.org/10.1109/itc.2014.6932971">http://dx.doi.org/10.1109/itc.2014.6932971</a></td>
    1497 </tr>
    1498 
    1499 
    1500 </li>
    1501 
    1502 </table></div><br><br>
    1503 
    1504 
    1505 
    1506 
    1507 <a class="EntryGoto" id="Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet"></a>
    1508 <b class="myheading" style="position: relative; left: 5%;">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</b>
    1509 
    1510 <div class="BibEntry">
    1511 
    1512 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1513 
    1514 <li>
    1515 
    1516 
    1517 <tr>
    1518      <td valign="top">Author</td>
    1519      <td valign="top">Blanton, Ethan and Chatterjee, Sarbajit and Gangam, Sriharsha and Kala, Sumit and Sharma, Deepti and Fahmy, Sonia and Sharma, Puneet</td>
    1520 </tr>
    1521 
    1522 <tr>
    1523      <td valign="top">Title</td>
    1524      <td valign="top">Design and evaluation of the S<sup>3</sup> monitor network measurement service on GENI</td>
    1525 </tr>
    1526 
    1527 <tr>
    1528      <td valign="top">Booktitle</td>
    1529      <td valign="top">2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)</td>
    1530 </tr>
    1531 
    1532 <tr>
    1533      <td valign="top">Location</td>
    1534      <td valign="top">Bangalore, India</td>
    1535 </tr>
    1536 
    1537 <tr>
    1538      <td valign="top">Publisher</td>
    1539      <td valign="top">IEEE</td>
    1540 </tr>
    1541 
    1542 <tr>
    1543      <td valign="top">Year</td>
    1544      <td valign="top">2012</td>
    1545 </tr>
    1546 
    1547 <tr>
    1548      <td valign="top">Abstract</td>
    1549      <td valign="top">Network monitoring capabilities are critical for both network operators and networked applications. In the context of an experimental test facility, network measurement is important for researchers experimenting with new network architectures and applications, as well as operators of the test facility itself. The Global Environment for Network Innovations (GENI) is a sophisticated test facility comprised of multiple ” control frameworks.” In this paper, we describe the design and implementation of S</td>
    1550 </tr>
    1551 
    1552 
    1553 
    1554 <tr>
    1555      <td valign="top">DOI</td>
    1556      <td valign="top">10.1109/COMSNETS.2012.6151327</td>
    1557 </tr>
    1558 
    1559 
    1560 
    1561 <tr>
    1562      <td valign="top">URL</td>
    1563      <td valign="top"><a href="http://dx.doi.org/10.1109/COMSNETS.2012.6151327">http://dx.doi.org/10.1109/COMSNETS.2012.6151327</a></td>
    1564 </tr>
    1565 
    1566 
    1567 </li>
    1568 
    1569 </table></div><br><br>
    1570 
    1571 
    1572 
    1573 
    1574 <a class="EntryGoto" id="Brown, D. and Nasir, H. and Carpenter, C. and Ascigil, O. and Griffioen, J. and Calvert, K."></a>
    1575 <b class="myheading" style="position: relative; left: 5%;">Brown, D. and Nasir, H. and Carpenter, C. and Ascigil, O. and Griffioen, J. and Calvert, K.</b>
    1576 
    1577 <div class="BibEntry">
    1578 
    1579 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1580 
    1581 <li>
    1582 
    1583 
    1584 <tr>
    1585      <td valign="top">Author</td>
    1586      <td valign="top">Brown, D. and Nasir, H. and Carpenter, C. and Ascigil, O. and Griffioen, J. and Calvert, K.</td>
    1587 </tr>
    1588 
    1589 <tr>
    1590      <td valign="top">Title</td>
    1591      <td valign="top">ChoiceNet gaming: Changing the gaming experience with economics</td>
    1592 </tr>
    1593 
    1594 <tr>
    1595      <td valign="top">Booktitle</td>
    1596      <td valign="top">Computer Games: AI, Animation, Mobile, Multimedia, Educational and Serious Games (CGAMES), 2014</td>
    1597 </tr>
    1598 
    1599 <tr>
    1600      <td valign="top">Publisher</td>
    1601      <td valign="top">IEEE</td>
    1602 </tr>
    1603 
    1604 <tr>
    1605      <td valign="top">Year</td>
    1606      <td valign="top">2014</td>
    1607 </tr>
    1608 
    1609 <tr>
    1610      <td valign="top">Abstract</td>
    1611      <td valign="top">When playing online games, the user experience is often dictated by the performance of the network. To deliver the best possible gaming experience, game developers often find themselves developing work-arounds that try to mask the lack of control they have over of the existing TCP/IP Internet. ChoiceNet, an emerging future Internet architecture, attempts to give applications enhanced control (choice) over the service they receive from the network. In particular, ChoiceNet supports an economic plane in which applications can purchase services from any provider. Because providers are compensated, they are motivated to offer a variety of innovative, excellent services, enabling applications to select the service best suited for its needs. Instead of coding work-arounds, game developers can obtain precisely the network service that is needed to optimize the game experience. In this paper, we describe the emerging ChoiceNet archi- tecture and show how computer games can benefit from the alternatives enabled by ChoiceNet. To demonstrate the benefits of the ChoiceNet architecture, we implemented a first person shooter game that uses ChoiceNet to ” purchase” and then send data over the purchased path resulting in substantially lower latency than the default path. We describe the ChoiceNet services used to implement the game, and we present performance results that show a significant reduction in latency. We also show how ChoiceNet can be used to purchase reliable (non-lossy) communication paths that improve the user's experience.</td>
    1612 </tr>
    1613 
    1614 
    1615 
    1616 <tr>
    1617      <td valign="top">DOI</td>
    1618      <td valign="top">10.1109/cgames.2014.6934146</td>
    1619 </tr>
    1620 
    1621 
    1622 
    1623 <tr>
    1624      <td valign="top">URL</td>
    1625      <td valign="top"><a href="http://dx.doi.org/10.1109/cgames.2014.6934146">http://dx.doi.org/10.1109/cgames.2014.6934146</a></td>
    1626 </tr>
    1627 
    1628 
    1629 </li>
    1630 
    1631 </table></div><br><br>
    1632 
    1633 
    1634 
    1635 
    1636 <a class="EntryGoto" id="Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R."></a>
    1637 <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R.</b>
    1638 
    1639 <div class="BibEntry">
    1640 
    1641 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1642 
    1643 <li>
    1644 
    1645 
    1646 <tr>
    1647      <td valign="top">Author</td>
    1648      <td valign="top">Calyam, P. and Rajagopalan, S. and Selvadhurai, A. and Mohan, S. and Venkataraman, A. and Berryman, A. and Ramnath, R.</td>
    1649 </tr>
    1650 
    1651 <tr>
    1652      <td valign="top">Title</td>
    1653      <td valign="top">Leveraging OpenFlow for resource placement of virtual desktop cloud applications</td>
    1654 </tr>
    1655 
    1656 <tr>
    1657      <td valign="top">Booktitle</td>
    1658      <td valign="top">Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on</td>
    1659 </tr>
    1660 
    1661 <tr>
    1662      <td valign="top">Year</td>
    1663      <td valign="top">2013</td>
    1664 </tr>
    1665 
    1666 
    1667 
    1668 
    1669 
    1670 
    1671 </li>
    1672 
    1673 </table></div><br><br>
    1674 
    1675 
    1676 
    1677 
    1678 <a class="EntryGoto" id="Calyam, P. and Seetharam, S. and Antequera, R. B."></a>
    1679 <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Seetharam, S. and Antequera, R. B.</b>
    1680 
    1681 <div class="BibEntry">
    1682 
    1683 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1684 
    1685 <li>
    1686 
    1687 
    1688 <tr>
    1689      <td valign="top">Author</td>
    1690      <td valign="top">Calyam, P. and Seetharam, S. and Antequera, R. B.</td>
    1691 </tr>
    1692 
    1693 <tr>
    1694      <td valign="top">Title</td>
    1695      <td valign="top">GENI Laboratory Exercises Development for a Cloud Computing Course</td>
    1696 </tr>
    1697 
    1698 <tr>
    1699      <td valign="top">Booktitle</td>
    1700      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    1701 </tr>
    1702 
    1703 <tr>
    1704      <td valign="top">Publisher</td>
    1705      <td valign="top">IEEE</td>
    1706 </tr>
    1707 
    1708 <tr>
    1709      <td valign="top">Year</td>
    1710      <td valign="top">2014</td>
    1711 </tr>
    1712 
    1713 <tr>
    1714      <td valign="top">Abstract</td>
    1715      <td valign="top">Cloud computing education involves integration of computing theories and information technologies in new and interesting ways. It can enable students to architect scalable infrastructures and develop web-service based applications utilizing distributed systems. In this paper, we describe our efforts, experiences and findings in the development of laboratory exercises that utilize GENI infrastructure in a cloud computing course offered at University of Missouri in Fall 2013. Three sets of laboratory exercises were developed and administered for 30 undergraduate/graduate students to help them gain skills in computer and network virtualization, and also to prepare them for distributed system programming projects. We found that the GENI infrastructure provides unique capabilities for student training, and combining it with lab exercises that use public clouds such as Amazon Web Services can provide an overall rich set of hands-on learning opportunities.</td>
    1716 </tr>
    1717 
    1718 
    1719 
    1720 <tr>
    1721      <td valign="top">DOI</td>
    1722      <td valign="top">10.1109/gree.2014.15</td>
    1723 </tr>
    1724 
    1725 
    1726 
    1727 <tr>
    1728      <td valign="top">URL</td>
    1729      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.15">http://dx.doi.org/10.1109/gree.2014.15</a></td>
    1730 </tr>
    1731 
    1732 
    1733 </li>
    1734 
    1735 </table></div><br><br>
    1736 
    1737 
    1738 
    1739 
    1740 <a class="EntryGoto" id="Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A."></a>
    1741 <b class="myheading" style="position: relative; left: 5%;">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</b>
    1742 
    1743 <div class="BibEntry">
    1744 
    1745 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1746 
    1747 <li>
    1748 
    1749 
    1750 <tr>
    1751      <td valign="top">Author</td>
    1752      <td valign="top">Calyam, P. and Sridharan, M. and Xu, Yingxiao and Zhu, Kunpeng and Berryman, A. and Patali, R. and Venkataraman, A.</td>
    1753 </tr>
    1754 
    1755 <tr>
    1756      <td valign="top">Title</td>
    1757      <td valign="top">Enabling performance intelligence for application adaptation in the Future Internet</td>
    1758 </tr>
    1759 
    1760 <tr>
    1761      <td valign="top">Journal</td>
    1762      <td valign="top">Communications and Networks, Journal of</td>
    1763 </tr>
    1764 
    1765 <tr>
    1766      <td valign="top">Year</td>
    1767      <td valign="top">2011</td>
    1768 </tr>
    1769 
    1770 
    1771 
    1772 <tr>
    1773      <td valign="top">DOI</td>
    1774      <td valign="top">10.1109/JCN.2011.6157475</td>
    1775 </tr>
    1776 
    1777 
    1778 
    1779 <tr>
    1780      <td valign="top">URL</td>
    1781      <td valign="top"><a href="http://dx.doi.org/10.1109/JCN.2011.6157475">http://dx.doi.org/10.1109/JCN.2011.6157475</a></td>
    1782 </tr>
    1783 
    1784 
    1785 </li>
    1786 
    1787 </table></div><br><br>
    1788 
    1789 
    1790 
    1791 
    1792 <a class="EntryGoto" id="Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio"></a>
    1793 <b class="myheading" style="position: relative; left: 5%;">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</b>
    1794 
    1795 <div class="BibEntry">
    1796 
    1797 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1798 
    1799 <li>
    1800 
    1801 
    1802 <tr>
    1803      <td valign="top">Author</td>
    1804      <td valign="top">Calyam, Prasad and Venkataraman, Aishwarya and Berryman, Alex and Faerman, Marcio</td>
    1805 </tr>
    1806 
    1807 <tr>
    1808      <td valign="top">Title</td>
    1809      <td valign="top">Experiences from Virtual Desktop CloudExperiments in GENI</td>
    1810 </tr>
    1811 
    1812 <tr>
    1813      <td valign="top">Booktitle</td>
    1814      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1815 </tr>
    1816 
    1817 <tr>
    1818      <td valign="top">Location</td>
    1819      <td valign="top">Los Angeles</td>
    1820 </tr>
    1821 
    1822 <tr>
    1823      <td valign="top">Year</td>
    1824      <td valign="top">2012</td>
    1825 </tr>
    1826 
    1827 <tr>
    1828      <td valign="top">Abstract</td>
    1829      <td valign="top">Popular applications such as email, photo/video galleries, and file storage are increasingly being supported by cloud platforms in residential, academia and industry communities. The next frontier for these user communities will be to transition 'traditional desktops' that have dedicated hardware and software configurations into 'virtual desktop clouds' that are accessible via thin-clients. In this paper, we describe experiences from our research and development of virtual desktop cloud experiments in GENI. Our experimentation goal is to investigate and develop optimal resource allocation frameworks and performance bench- marking tools that can enable provisioning (i.e., resource sizing) and placement (i.e., resource mapping) of thin-client based virtual desktops at Internet-scale. We first motivate why virtual desktop cloud experiments cannot be done only at a table-top level, and why infrastructures such as GENI are essential. Next, we detail the methodology of our completed ” provisioning” experiments, and our work-in-progress ” placement” experiments in GENI that leverage multiple kinds of GENI resources such as aggregates, measurement services and experimenter workflow tools, as well as commercial software. Lastly, we present our vision on how our experiment slice setup and application development experiences, as well as outcomes can be leveraged in classroom labs, and 'living labs' that use GENI resources to foster training and wide- adoption of Future Internet applications.</td>
    1830 </tr>
    1831 
    1832 
    1833 
    1834 
    1835 
    1836 
    1837 </li>
    1838 
    1839 </table></div><br><br>
    1840 
    1841 
    1842 
    1843 
    1844 <a class="EntryGoto" id="Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James"></a>
    1845 <b class="myheading" style="position: relative; left: 5%;">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</b>
    1846 
    1847 <div class="BibEntry">
    1848 
    1849 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1850 
    1851 <li>
    1852 
    1853 
    1854 <tr>
    1855      <td valign="top">Author</td>
    1856      <td valign="top">Cameron, Katherine and Brooks, R. R. and Deng, Juan and Yu, Lu and Wang, K. C. and Martin, James</td>
    1857 </tr>
    1858 
    1859 <tr>
    1860      <td valign="top">Title</td>
    1861      <td valign="top">WiMAX: Bandwidth Contention Resolution Vulnerability to Denial of Service Attacks</td>
    1862 </tr>
    1863 
    1864 <tr>
    1865      <td valign="top">Booktitle</td>
    1866      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    1867 </tr>
    1868 
    1869 <tr>
    1870      <td valign="top">Location</td>
    1871      <td valign="top">Los Angeles</td>
    1872 </tr>
    1873 
    1874 <tr>
    1875      <td valign="top">Year</td>
    1876      <td valign="top">2012</td>
    1877 </tr>
    1878 
    1879 <tr>
    1880      <td valign="top">Abstract</td>
    1881      <td valign="top">Wireless communications is part of everyday life and 4G technology, including WiMAX, offers higher data rates and wider coverage than predecessor 3G technologies. Many security vulnerabilities have been discovered in 3G protocols and these vulnerabilities may still exist in next generation 4G protocols. This paper examines how system parameters for the WiMAX Bandwidth Contention Resolution process can affect network vulnerability to DoS attacks. It will present software simulations that explore system parameter settings and will cover the current phase of hardware simulations.</td>
    1882 </tr>
    1883 
    1884 
    1885 
    1886 
    1887 
    1888 
    1889 </li>
    1890 
    1891 </table></div><br><br>
    1892 
    1893 
    1894 
    1895 
    1896 <a class="EntryGoto" id="Chakrabortty, Aranya and Xin, Yufeng"></a>
    1897 <b class="myheading" style="position: relative; left: 5%;">Chakrabortty, Aranya and Xin, Yufeng</b>
    1898 
    1899 <div class="BibEntry">
    1900 
    1901 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1902 
    1903 <li>
    1904 
    1905 
    1906 <tr>
    1907      <td valign="top">Author</td>
    1908      <td valign="top">Chakrabortty, Aranya and Xin, Yufeng</td>
    1909 </tr>
    1910 
    1911 <tr>
    1912      <td valign="top">Title</td>
    1913      <td valign="top">Hardware-in-the-Loop Simulations and Verifications of Smart Power Systems Over an Exo-GENI Testbed</td>
    1914 </tr>
    1915 
    1916 <tr>
    1917      <td valign="top">Booktitle</td>
    1918      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    1919 </tr>
    1920 
    1921 <tr>
    1922      <td valign="top">Location</td>
    1923      <td valign="top">Salt Lake City, UT</td>
    1924 </tr>
    1925 
    1926 <tr>
    1927      <td valign="top">Publisher</td>
    1928      <td valign="top">IEEE</td>
    1929 </tr>
    1930 
    1931 <tr>
    1932      <td valign="top">Year</td>
    1933      <td valign="top">2013</td>
    1934 </tr>
    1935 
    1936 
    1937 
    1938 <tr>
    1939      <td valign="top">DOI</td>
    1940      <td valign="top">10.1109/GREE.2013.12</td>
    1941 </tr>
    1942 
    1943 
    1944 
    1945 <tr>
    1946      <td valign="top">URL</td>
    1947      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.12">http://dx.doi.org/10.1109/GREE.2013.12</a></td>
    1948 </tr>
    1949 
    1950 
    1951 </li>
    1952 
    1953 </table></div><br><br>
    1954 
    1955 
    1956 
    1957 
    1958 <a class="EntryGoto" id="Chen, Kang and Shen, Haiying and Zhang, Haibo"></a>
    1959 <b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Shen, Haiying and Zhang, Haibo</b>
    1960 
    1961 <div class="BibEntry">
    1962 
    1963 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    1964 
    1965 <li>
    1966 
    1967 
    1968 <tr>
    1969      <td valign="top">Author</td>
    1970      <td valign="top">Chen, Kang and Shen, Haiying and Zhang, Haibo</td>
    1971 </tr>
    1972 
    1973 <tr>
    1974      <td valign="top">Title</td>
    1975      <td valign="top">Leveraging Social Networks for P2P Content-Based File Sharing in Mobile Ad Hoc Networks</td>
    1976 </tr>
    1977 
    1978 <tr>
    1979      <td valign="top">Booktitle</td>
    1980      <td valign="top">2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems</td>
    1981 </tr>
    1982 
    1983 <tr>
    1984      <td valign="top">Location</td>
    1985      <td valign="top">Valencia, Spain</td>
    1986 </tr>
    1987 
    1988 <tr>
    1989      <td valign="top">Publisher</td>
    1990      <td valign="top">IEEE</td>
    1991 </tr>
    1992 
    1993 <tr>
    1994      <td valign="top">Year</td>
    1995      <td valign="top">2011</td>
    1996 </tr>
    1997 
    1998 <tr>
    1999      <td valign="top">Abstract</td>
    2000      <td valign="top">Current P2P file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, advertisement-based and social contact-based. The first two groups of methods can easily generate high overhead and low scalability, and the third group fails to consider the social interests (content) of mobile nodes, which otherwise can improve file searching efficiency. In this paper, we propose a P2P content-based file sharing system for MANETs. The system uses an interest extraction algorithm to derive a node's interests from its files for complex queries. For efficient file searching, it groups common-interest nodes that frequently meet with each other as communities. Further, it takes advantage of node mobility by designating stable nodes, which has frequent contact with community members, as community coordinators for intra-community searching, and highly-mobile nodes as community ambassadors for inter-community searching. An interest-oriented file searching scheme further enhances the file searching success rate. We first deployed our system on the real-world GENI Orbit testbed with a real trace and then conducted experiment on the ns2 simulator with both real trace and simulated disconnected and connected MANET scenario. The test results show that our system significantly lowers transmission cost and improves file searching success rate compared to current methods.</td>
    2001 </tr>
    2002 
    2003 
    2004 
    2005 <tr>
    2006      <td valign="top">DOI</td>
    2007      <td valign="top">10.1109/MASS.2011.24</td>
    2008 </tr>
    2009 
    2010 
    2011 
    2012 <tr>
    2013      <td valign="top">URL</td>
    2014      <td valign="top"><a href="http://dx.doi.org/10.1109/MASS.2011.24">http://dx.doi.org/10.1109/MASS.2011.24</a></td>
    2015 </tr>
    2016 
    2017 
    2018 </li>
    2019 
    2020 </table></div><br><br>
    2021 
    2022 
    2023 
    2024 
    2025 <a class="EntryGoto" id="Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze"></a>
    2026 <b class="myheading" style="position: relative; left: 5%;">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</b>
    2027 
    2028 <div class="BibEntry">
    2029 
    2030 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2031 
    2032 <li>
    2033 
    2034 
    2035 <tr>
    2036      <td valign="top">Author</td>
    2037      <td valign="top">Chen, Kang and Xu, Ke and Winburn, Steven and Shen, Haiying and Wang, Kuang-Ching and Li, Ze</td>
    2038 </tr>
    2039 
    2040 <tr>
    2041      <td valign="top">Title</td>
    2042      <td valign="top">Experimentation of a MANET Routing Algorithm on the GENI ORBIT Testbed</td>
    2043 </tr>
    2044 
    2045 <tr>
    2046      <td valign="top">Booktitle</td>
    2047      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    2048 </tr>
    2049 
    2050 <tr>
    2051      <td valign="top">Location</td>
    2052      <td valign="top">Los Angeles</td>
    2053 </tr>
    2054 
    2055 <tr>
    2056      <td valign="top">Year</td>
    2057      <td valign="top">2012</td>
    2058 </tr>
    2059 
    2060 <tr>
    2061      <td valign="top">Abstract</td>
    2062      <td valign="top">This paper proposes a systematic procedure for experimentation of Mobile ad hoc networks (MANETs) on the ORBIT testbed. MANETs have attracted significant re- search interests in recent years. Most of routing or file sharing algorithms in MANETs were only evaluated by theoretical analysis or simulations because of the requirement of large scale networks. However, due to the distinctive properties of MANETs, such as mobility and decentralized structure, it has been non-trivial to deploy a real testbed for the verification. The Global Environment for Network Innovations (GENI) project sponsored by the National Science Foundation (NSF) provides an exploratory environment for academic real-world experiments, such as the ORBIT testbed. A stable and repeatable procedure for experimentation on real testbeds is necessary and important to assure the validity of results. In this paper, a MANET routing algorithm, namely LORD, was tested on the ORBIT testbed, using the proposed procedure. Specifically, we first configure the wireless interface on each node to enable the communication between each pair of nodes. Then a set of methods are adopted to construct the MANETs scenario for test. The network status is monitored throughout the entire duration of experiments. Finally, the experiment results of LORD on the GENI ORBIT testbed are demonstrated.</td>
    2063 </tr>
    2064 
    2065 
    2066 
    2067 
    2068 
    2069 
    2070 </li>
    2071 
    2072 </table></div><br><br>
    2073 
    2074 
    2075 
    2076 
    2077 <a class="EntryGoto" id="Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep"></a>
    2078 <b class="myheading" style="position: relative; left: 5%;">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</b>
    2079 
    2080 <div class="BibEntry">
    2081 
    2082 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2083 
    2084 <li>
    2085 
    2086 
    2087 <tr>
    2088      <td valign="top">Author</td>
    2089      <td valign="top">Cherukuri, Ramkumar and Liu, Xuan and Bavier, Andy and Sterbenz, James P. G. and Medhi, Deep</td>
    2090 </tr>
    2091 
    2092 <tr>
    2093      <td valign="top">Title</td>
    2094      <td valign="top">Network virtualization in GpENI: Framework, implementation &#x0026;amp; integration experience</td>
    2095 </tr>
    2096 
    2097 <tr>
    2098      <td valign="top">Booktitle</td>
    2099      <td valign="top">12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops</td>
    2100 </tr>
    2101 
    2102 <tr>
    2103      <td valign="top">Location</td>
    2104      <td valign="top">Dublin, Ireland</td>
    2105 </tr>
    2106 
    2107 <tr>
    2108      <td valign="top">Publisher</td>
    2109      <td valign="top">IEEE</td>
    2110 </tr>
    2111 
    2112 <tr>
    2113      <td valign="top">Year</td>
    2114      <td valign="top">2011</td>
    2115 </tr>
    2116 
    2117 <tr>
    2118      <td valign="top">Abstract</td>
    2119      <td valign="top">Great Plains Environment for Network Innovation (GpENI) is an international testbed for future Internet research. A key component of GpENI is programmable network virtualization (GpENI-VINI). The scope of this paper is to present the framework, implementation and integration experience with network virtualization in GpENI. In particular, this is described through our experience of implementing and integrating the XORP (eXtensible Open Router Platform) routing platform into GpENI-VINI. Preliminary results on measurements and validation are presented.</td>
    2120 </tr>
    2121 
    2122 
    2123 
    2124 <tr>
    2125      <td valign="top">DOI</td>
    2126      <td valign="top">10.1109/INM.2011.5990568</td>
    2127 </tr>
    2128 
    2129 
    2130 
    2131 <tr>
    2132      <td valign="top">URL</td>
    2133      <td valign="top"><a href="http://dx.doi.org/10.1109/INM.2011.5990568">http://dx.doi.org/10.1109/INM.2011.5990568</a></td>
    2134 </tr>
    2135 
    2136 
    2137 </li>
    2138 
    2139 </table></div><br><br>
    2140 
    2141 
    2142 
    2143 
    2144 <a class="EntryGoto" id="Chowdhury and Boutaba, Raouf"></a>
    2145 <b class="myheading" style="position: relative; left: 5%;">Chowdhury and Boutaba, Raouf</b>
    2146 
    2147 <div class="BibEntry">
    2148 
    2149 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2150 
    2151 <li>
    2152 
    2153 
    2154 <tr>
    2155      <td valign="top">Author</td>
    2156      <td valign="top">Chowdhury and Boutaba, Raouf</td>
    2157 </tr>
    2158 
    2159 <tr>
    2160      <td valign="top">Title</td>
    2161      <td valign="top">A survey of network virtualization</td>
    2162 </tr>
    2163 
    2164 <tr>
    2165      <td valign="top">Journal</td>
    2166      <td valign="top">Computer Networks</td>
    2167 </tr>
    2168 
    2169 <tr>
    2170      <td valign="top">Year</td>
    2171      <td valign="top">2010</td>
    2172 </tr>
    2173 
    2174 
    2175 
    2176 <tr>
    2177      <td valign="top">DOI</td>
    2178      <td valign="top">http://dx.doi.org/10.1016/j.comnet.2009.10.017</td>
    2179 </tr>
    2180 
    2181 
    2182 
    2183 <tr>
    2184      <td valign="top">URL</td>
    2185      <td valign="top"><a href="http://www.sciencedirect.com/science/article/pii/S1389128609003387">http://www.sciencedirect.com/science/article/pii/S1389128609003387</a></td>
    2186 </tr>
    2187 
    2188 
    2189 </li>
    2190 
    2191 </table></div><br><br>
    2192 
    2193 
    2194 
    2195 
    2196 <a class="EntryGoto" id="Dane, L. and Gurkan, D."></a>
    2197 <b class="myheading" style="position: relative; left: 5%;">Dane, L. and Gurkan, D.</b>
    2198 
    2199 <div class="BibEntry">
    2200 
    2201 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2202 
    2203 <li>
    2204 
    2205 
    2206 <tr>
    2207      <td valign="top">Author</td>
    2208      <td valign="top">Dane, L. and Gurkan, D.</td>
    2209 </tr>
    2210 
    2211 <tr>
    2212      <td valign="top">Title</td>
    2213      <td valign="top">GENI with a Network Processing Unit: Enriching SDN Application Experiments</td>
    2214 </tr>
    2215 
    2216 <tr>
    2217      <td valign="top">Booktitle</td>
    2218      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    2219 </tr>
    2220 
    2221 <tr>
    2222      <td valign="top">Publisher</td>
    2223      <td valign="top">IEEE</td>
    2224 </tr>
    2225 
    2226 <tr>
    2227      <td valign="top">Year</td>
    2228      <td valign="top">2014</td>
    2229 </tr>
    2230 
    2231 <tr>
    2232      <td valign="top">Abstract</td>
    2233      <td valign="top">This paper reports the integration of Dell's specialized split data plane (SDP) OpenFlow switch into the GENI testbed. In addition, the paper outlines the research directions in network science and engineering that such a switch may enable together with a new perspective on education in network programming. An SDP switch can be used to perform some specialized processing on flows with special hardware accelerators in addition to hosting any application (running on a Linux OS) that a user may insert on the path of a flow. The SDP switch is composed of a Dell switch (PowerConnect 7024) with an internal physical connection to a sub-unit, Network Processor Unit (NPU), by Cavium Networks. Hosting an OpenvSwitch on the NPU with open hosting of Linux applications enables software-defined networking experiments. The integration challenges/process associated with this unit is presented as a future reference to other such foreign box integrations.</td>
    2234 </tr>
    2235 
    2236 
    2237 
    2238 <tr>
    2239      <td valign="top">DOI</td>
    2240      <td valign="top">10.1109/gree.2014.27</td>
    2241 </tr>
    2242 
    2243 
    2244 
    2245 <tr>
    2246      <td valign="top">URL</td>
    2247      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.27">http://dx.doi.org/10.1109/gree.2014.27</a></td>
    2248 </tr>
    2249 
    2250 
    2251 </li>
    2252 
    2253 </table></div><br><br>
    2254 
    2255 
    2256 
    2257 
    2258 <a class="EntryGoto" id="Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D."></a>
    2259 <b class="myheading" style="position: relative; left: 5%;">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</b>
    2260 
    2261 <div class="BibEntry">
    2262 
    2263 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2264 
    2265 <li>
    2266 
    2267 
    2268 <tr>
    2269      <td valign="top">Author</td>
    2270      <td valign="top">Das, S. and Yiakoumis, Y. and Parulkar, G. and McKeown, N. and Singh, P. and Getachew, D. and Desai, P. D.</td>
    2271 </tr>
    2272 
    2273 <tr>
    2274      <td valign="top">Title</td>
    2275      <td valign="top">Application-aware aggregation and traffic engineering in a converged packet-circuit network</td>
    2276 </tr>
    2277 
    2278 <tr>
    2279      <td valign="top">Booktitle</td>
    2280      <td valign="top">Optical Fiber Communication Conference and Exposition (OFC/NFOEC), 2011 and the National Fiber Optic Engineers Conference</td>
    2281 </tr>
    2282 
    2283 <tr>
    2284      <td valign="top">Publisher</td>
    2285      <td valign="top">IEEE</td>
    2286 </tr>
    2287 
    2288 <tr>
    2289      <td valign="top">Year</td>
    2290      <td valign="top">2011</td>
    2291 </tr>
    2292 
    2293 
    2294 
    2295 
    2296 
    2297 <tr>
    2298      <td valign="top">URL</td>
    2299      <td valign="top"><a href="http://ieeexplore.ieee.org/xpls/abs&#x005F;all.jsp?arnumber=5875210">http://ieeexplore.ieee.org/xpls/abs&#x005F;all.jsp?arnumber=5875210</a></td>
    2300 </tr>
    2301 
    2302 
    2303 </li>
    2304 
    2305 </table></div><br><br>
    2306 
    2307 
    2308 
    2309 
    2310 <a class="EntryGoto" id="Deng, Juan and Brooks, Richard R. and Martin, James"></a>
    2311 <b class="myheading" style="position: relative; left: 5%;">Deng, Juan and Brooks, Richard R. and Martin, James</b>
    2312 
    2313 <div class="BibEntry">
    2314 
    2315 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2316 
    2317 <li>
    2318 
    2319 
    2320 <tr>
    2321      <td valign="top">Author</td>
    2322      <td valign="top">Deng, Juan and Brooks, Richard R. and Martin, James</td>
    2323 </tr>
    2324 
    2325 <tr>
    2326      <td valign="top">Title</td>
    2327      <td valign="top">Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability</td>
    2328 </tr>
    2329 
    2330 <tr>
    2331      <td valign="top">Journal</td>
    2332      <td valign="top">International Journal of Performability Engineering</td>
    2333 </tr>
    2334 
    2335 <tr>
    2336      <td valign="top">Year</td>
    2337      <td valign="top">2012</td>
    2338 </tr>
    2339 
    2340 <tr>
    2341      <td valign="top">Abstract</td>
    2342      <td valign="top">The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resulting from parameter misconfiguration are difficult for network operators to detect. We focus on bandwidth contention resolution aspects of the WiMAX MAC protocol. Simulations are performed using the ns-2 simulator. Analysis of Variance (ANOVA) techniques on the resulting simulation data identify which bandwidth contention resolution parameter combinations are crucial for configuring WiMAX to be less vulnerable to DoS attacks.</td>
    2343 </tr>
    2344 
    2345 
    2346 
    2347 
    2348 
    2349 
    2350 </li>
    2351 
    2352 </table></div><br><br>
    2353 
    2354 
    2355 
    2356 
    2357 <a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi"></a>
    2358 <b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</b>
    2359 
    2360 <div class="BibEntry">
    2361 
    2362 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2363 
    2364 <li>
    2365 
    2366 
    2367 <tr>
    2368      <td valign="top">Author</td>
    2369      <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Strum, Matt and Wong, Gary and Carpenter, Charles and Fei, Zongming and Griffioen, James and Nasir, Hussamuddin and Reed, Jeremy and Wu, Xiongqi</td>
    2370 </tr>
    2371 
    2372 <tr>
    2373      <td valign="top">Title</td>
    2374      <td valign="top">Getting started with GENI: a user tutorial</td>
    2375 </tr>
    2376 
    2377 <tr>
    2378      <td valign="top">Journal</td>
    2379      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    2380 </tr>
    2381 
    2382 <tr>
    2383      <td valign="top">Publisher</td>
    2384      <td valign="top">ACM</td>
    2385 </tr>
    2386 
    2387 <tr>
    2388      <td valign="top">Address</td>
    2389      <td valign="top">New York, NY, USA</td>
    2390 </tr>
    2391 
    2392 <tr>
    2393      <td valign="top">Year</td>
    2394      <td valign="top">2012</td>
    2395 </tr>
    2396 
    2397 <tr>
    2398      <td valign="top">Abstract</td>
    2399      <td valign="top">GENI, the Global Environment for Network Innovations, is a National Science Foundation project to create a &#x76;&#x0308;irtual laboratory at the frontiers of network science and engineering for exploring future internets at scale.&#x20;&#x0308;It provides researchers, educators, and students with resources that they can use to build their own networks that span the country and - through federation - the world. GENI enables experimenters to try out bold new network architectures and designs for networked systems, and to deploy and evaluate these systems on a diverse set of resources over a large footprint. This tutorial is a starting point for running experiments on GENI. It provides an overview of GENI and covers the process of creating a network and running a simple experiment using two tools: the Flack GUI and the INSTOOLS instrumentation service.</td>
    2400 </tr>
    2401 
    2402 
    2403 
    2404 <tr>
    2405      <td valign="top">DOI</td>
    2406      <td valign="top">10.1145/2096149.2096161</td>
    2407 </tr>
    2408 
    2409 
    2410 
    2411 <tr>
    2412      <td valign="top">URL</td>
    2413      <td valign="top"><a href="http://dx.doi.org/10.1145/2096149.2096161">http://dx.doi.org/10.1145/2096149.2096161</a></td>
    2414 </tr>
    2415 
    2416 
    2417 </li>
    2418 
    2419 </table></div><br><br>
    2420 
    2421 
    2422 
    2423 
    2424 <a class="EntryGoto" id="Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin"></a>
    2425 <b class="myheading" style="position: relative; left: 5%;">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</b>
    2426 
    2427 <div class="BibEntry">
    2428 
    2429 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2430 
    2431 <li>
    2432 
    2433 
    2434 <tr>
    2435      <td valign="top">Author</td>
    2436      <td valign="top">Duerig, Jonathon and Ricci, Robert and Stoller, Leigh and Wong, Gary and Chikkulapelly, Srikanth and Seok, Woojin</td>
    2437 </tr>
    2438 
    2439 <tr>
    2440      <td valign="top">Title</td>
    2441      <td valign="top">Designing a Federated Testbed as a Distributed System</td>
    2442 </tr>
    2443 
    2444 <tr>
    2445      <td valign="top">Journal</td>
    2446      <td valign="top">8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012)</td>
    2447 </tr>
    2448 
    2449 <tr>
    2450      <td valign="top">Year</td>
    2451      <td valign="top">2012</td>
    2452 </tr>
    2453 
    2454 <tr>
    2455      <td valign="top">Abstract</td>
    2456      <td valign="top">Traditionally, testbeds for networking and systems research have been stand-alone facilities: each is owned and operated by a single administrative entity, and is intended to be used independently of other testbeds. However, this isolated facility model is at odds with researchers' ever-increasing needs for experiments at larger scale and with a broader diversity of network technologies. The research community will be much better served by a federated model. In this model, each federated testbed maintains its own autonomy and unique strengths, but all federates work together to make their resources available under a common framework. Our challenge, then, is to design a federated testbed framework that balances competing needs: We must establish trust, but at the same time maintain the autonomy of each federated facility. While providing a unified interface to a broad set of resources, we need to expose the diversity that makes them valuable. Finally, our federation should work smoothly in a coordinated fashion, but avoid central points of failure and inter-facility dependencies. We argue that treating testbed design as a federated distributed systems problem is an effective approach to achieving this balance. The technique is illustrated through the example of ProtoGENI, a system we have designed, built, and operated according to the federated model.</td>
    2457 </tr>
    2458 
    2459 
    2460 
    2461 
    2462 
    2463 
    2464 </li>
    2465 
    2466 </table></div><br><br>
    2467 
    2468 
    2469 
    2470 
    2471 <a class="EntryGoto" id="Elliott, Chip and Falk, Aaron"></a>
    2472 <b class="myheading" style="position: relative; left: 5%;">Elliott, Chip and Falk, Aaron</b>
    2473 
    2474 <div class="BibEntry">
    2475 
    2476 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2477 
    2478 <li>
    2479 
    2480 
    2481 <tr>
    2482      <td valign="top">Author</td>
    2483      <td valign="top">Elliott, Chip and Falk, Aaron</td>
    2484 </tr>
    2485 
    2486 <tr>
    2487      <td valign="top">Title</td>
    2488      <td valign="top">An update on the GENI project</td>
    2489 </tr>
    2490 
    2491 <tr>
    2492      <td valign="top">Journal</td>
    2493      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    2494 </tr>
    2495 
    2496 <tr>
    2497      <td valign="top">Publisher</td>
    2498      <td valign="top">ACM</td>
    2499 </tr>
    2500 
    2501 <tr>
    2502      <td valign="top">Address</td>
    2503      <td valign="top">New York, NY, USA</td>
    2504 </tr>
    2505 
    2506 <tr>
    2507      <td valign="top">Year</td>
    2508      <td valign="top">2009</td>
    2509 </tr>
    2510 
    2511 <tr>
    2512      <td valign="top">Abstract</td>
    2513      <td valign="top">Environment for Network Innovations. Early prototypes of GENI are starting to come online as an end-to-end system and network researchers are invited to participate by engaging in the design process or using GENI to conduct experiments.</td>
    2514 </tr>
    2515 
    2516 
    2517 
    2518 <tr>
    2519      <td valign="top">DOI</td>
    2520      <td valign="top">10.1145/1568613.1568620</td>
    2521 </tr>
    2522 
    2523 
    2524 
    2525 <tr>
    2526      <td valign="top">URL</td>
    2527      <td valign="top"><a href="http://dx.doi.org/10.1145/1568613.1568620">http://dx.doi.org/10.1145/1568613.1568620</a></td>
    2528 </tr>
    2529 
    2530 
    2531 </li>
    2532 
    2533 </table></div><br><br>
    2534 
    2535 
    2536 
    2537 
    2538 <a class="EntryGoto" id="Erazo, Miguel A. and Liu, Jason"></a>
    2539 <b class="myheading" style="position: relative; left: 5%;">Erazo, Miguel A. and Liu, Jason</b>
    2540 
    2541 <div class="BibEntry">
    2542 
    2543 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2544 
    2545 <li>
    2546 
    2547 
    2548 <tr>
    2549      <td valign="top">Author</td>
    2550      <td valign="top">Erazo, Miguel A. and Liu, Jason</td>
    2551 </tr>
    2552 
    2553 <tr>
    2554      <td valign="top">Title</td>
    2555      <td valign="top">On enabling real-time large-scale network simulation in GENI: the PrimoGENI approach</td>
    2556 </tr>
    2557 
    2558 <tr>
    2559      <td valign="top">Booktitle</td>
    2560      <td valign="top">Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques</td>
    2561 </tr>
    2562 
    2563 <tr>
    2564      <td valign="top">Location</td>
    2565      <td valign="top">Torremolinos, Malaga, Spain</td>
    2566 </tr>
    2567 
    2568 <tr>
    2569      <td valign="top">Publisher</td>
    2570      <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
    2571 </tr>
    2572 
    2573 <tr>
    2574      <td valign="top">Address</td>
    2575      <td valign="top">ICST, Brussels, Belgium, Belgium</td>
    2576 </tr>
    2577 
    2578 <tr>
    2579      <td valign="top">Year</td>
    2580      <td valign="top">2010</td>
    2581 </tr>
    2582 
    2583 <tr>
    2584      <td valign="top">Abstract</td>
    2585      <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform, a &#x76;&#x0308;irtual laboratory&#x20;&#x0308;for the design, implementation and evaluation of future Internets. In this paper, we present an overview of PrimoGENI, a GENI project with the goal of extending the GENI suite of interoperable infrastructure to allow network experiments at scale, involving physical, simulated and emulated network entities.</td>
    2586 </tr>
    2587 
    2588 
    2589 
    2590 <tr>
    2591      <td valign="top">DOI</td>
    2592      <td valign="top">10.4108/ICST.SIMUTOOLS2010.8636</td>
    2593 </tr>
    2594 
    2595 
    2596 
    2597 <tr>
    2598      <td valign="top">URL</td>
    2599      <td valign="top"><a href="http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636">http://dx.doi.org/10.4108/ICST.SIMUTOOLS2010.8636</a></td>
    2600 </tr>
    2601 
    2602 
    2603 </li>
    2604 
    2605 </table></div><br><br>
    2606 
    2607 
    2608 
    2609 
    2610 <a class="EntryGoto" id="Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John"></a>
    2611 <b class="myheading" style="position: relative; left: 5%;">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</b>
    2612 
    2613 <div class="BibEntry">
    2614 
    2615 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2616 
    2617 <li>
    2618 
    2619 
    2620 <tr>
    2621      <td valign="top">Author</td>
    2622      <td valign="top">Esposito, Flavio and Wang, Yuefeng and Matta, Ibrahim and Day, John</td>
    2623 </tr>
    2624 
    2625 <tr>
    2626      <td valign="top">Title</td>
    2627      <td valign="top">Dynamic Layer Instantiation as a Service</td>
    2628 </tr>
    2629 
    2630 <tr>
    2631      <td valign="top">Location</td>
    2632      <td valign="top">Lombard, IL</td>
    2633 </tr>
    2634 
    2635 <tr>
    2636      <td valign="top">Publisher</td>
    2637      <td valign="top">USENIX Association</td>
    2638 </tr>
    2639 
    2640 <tr>
    2641      <td valign="top">Address</td>
    2642      <td valign="top">Berkeley, CA, USA</td>
    2643 </tr>
    2644 
    2645 <tr>
    2646      <td valign="top">Year</td>
    2647      <td valign="top">2013</td>
    2648 </tr>
    2649 
    2650 
    2651 
    2652 
    2653 
    2654 <tr>
    2655      <td valign="top">URL</td>
    2656      <td valign="top"><a href="https://www.usenix.org/system/files/nsdip13-paper11.pdf">https://www.usenix.org/system/files/nsdip13-paper11.pdf</a></td>
    2657 </tr>
    2658 
    2659 
    2660 </li>
    2661 
    2662 </table></div><br><br>
    2663 
    2664 
    2665 
    2666 
    2667 <a class="EntryGoto" id="Feamster, Nick and Gao, Lixin and Rexford, Jennifer"></a>
    2668 <b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</b>
    2669 
    2670 <div class="BibEntry">
    2671 
    2672 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2673 
    2674 <li>
    2675 
    2676 
    2677 <tr>
    2678      <td valign="top">Author</td>
    2679      <td valign="top">Feamster, Nick and Gao, Lixin and Rexford, Jennifer</td>
    2680 </tr>
    2681 
    2682 <tr>
    2683      <td valign="top">Title</td>
    2684      <td valign="top">How to lease the internet in your spare time</td>
    2685 </tr>
    2686 
    2687 <tr>
    2688      <td valign="top">Journal</td>
    2689      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    2690 </tr>
    2691 
    2692 <tr>
    2693      <td valign="top">Publisher</td>
    2694      <td valign="top">ACM</td>
    2695 </tr>
    2696 
    2697 <tr>
    2698      <td valign="top">Address</td>
    2699      <td valign="top">New York, NY, USA</td>
    2700 </tr>
    2701 
    2702 <tr>
    2703      <td valign="top">Year</td>
    2704      <td valign="top">2007</td>
    2705 </tr>
    2706 
    2707 
    2708 
    2709 <tr>
    2710      <td valign="top">DOI</td>
    2711      <td valign="top">10.1145/1198255.1198265</td>
    2712 </tr>
    2713 
    2714 
    2715 
    2716 <tr>
    2717      <td valign="top">URL</td>
    2718      <td valign="top"><a href="http://doi.acm.org/10.1145/1198255.1198265">http://doi.acm.org/10.1145/1198255.1198265</a></td>
    2719 </tr>
    2720 
    2721 
    2722 </li>
    2723 
    2724 </table></div><br><br>
    2725 
    2726 
    2727 
    2728 
    2729 <a class="EntryGoto" id="Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram"></a>
    2730 <b class="myheading" style="position: relative; left: 5%;">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</b>
    2731 
    2732 <div class="BibEntry">
    2733 
    2734 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2735 
    2736 <li>
    2737 
    2738 
    2739 <tr>
    2740      <td valign="top">Author</td>
    2741      <td valign="top">Feamster, Nick and Nayak, Ankur and Kim, Hyojoon and Clark, Russell and Mundada, Yogesh and Ramachandran, Anirudh and bin Tariq, Mukarram</td>
    2742 </tr>
    2743 
    2744 <tr>
    2745      <td valign="top">Title</td>
    2746      <td valign="top">Decoupling policy from configuration in campus and enterprise networks</td>
    2747 </tr>
    2748 
    2749 <tr>
    2750      <td valign="top">Booktitle</td>
    2751      <td valign="top">2010 17th IEEE Workshop on Local &#x0026; Metropolitan Area Networks (LANMAN)</td>
    2752 </tr>
    2753 
    2754 <tr>
    2755      <td valign="top">Location</td>
    2756      <td valign="top">Long Branch, NJ, USA</td>
    2757 </tr>
    2758 
    2759 <tr>
    2760      <td valign="top">Publisher</td>
    2761      <td valign="top">IEEE</td>
    2762 </tr>
    2763 
    2764 <tr>
    2765      <td valign="top">Year</td>
    2766      <td valign="top">2010</td>
    2767 </tr>
    2768 
    2769 <tr>
    2770      <td valign="top">Abstract</td>
    2771      <td valign="top">This paper surveys our ongoing work on the use of software-defined networking to simplify two acute policy problems in campus and enterprise network operations: access control and information flow control. We describe how the current coupling of high-level policy with low-level configuration makes these problems challenging today. We describe the specific policy problems faced by campus and enterprise network operators; illustrate our approach, which leverages recent trends in separating the network's ” control plane” from the data plane; and show how this approach can be applied to simplify these two enterprise network management tasks. We also describe our ongoing deployment efforts to build a campus network testbed where trial designs can be deployed and evaluated. We close with a summary of current and future research challenges for solving challenges within enterprise networks within the context of this new paradigm.</td>
    2772 </tr>
    2773 
    2774 
    2775 
    2776 <tr>
    2777      <td valign="top">DOI</td>
    2778      <td valign="top">10.1109/LANMAN.2010.5507162</td>
    2779 </tr>
    2780 
    2781 
    2782 
    2783 <tr>
    2784      <td valign="top">URL</td>
    2785      <td valign="top"><a href="http://dx.doi.org/10.1109/LANMAN.2010.5507162">http://dx.doi.org/10.1109/LANMAN.2010.5507162</a></td>
    2786 </tr>
    2787 
    2788 
    2789 </li>
    2790 
    2791 </table></div><br><br>
    2792 
    2793 
    2794 
    2795 
    2796 <a class="EntryGoto" id="Fei, Zongming and Xu, Qingrong and Lu, Hui"></a>
    2797 <b class="myheading" style="position: relative; left: 5%;">Fei, Zongming and Xu, Qingrong and Lu, Hui</b>
    2798 
    2799 <div class="BibEntry">
    2800 
    2801 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2802 
    2803 <li>
    2804 
    2805 
    2806 <tr>
    2807      <td valign="top">Author</td>
    2808      <td valign="top">Fei, Zongming and Xu, Qingrong and Lu, Hui</td>
    2809 </tr>
    2810 
    2811 <tr>
    2812      <td valign="top">Title</td>
    2813      <td valign="top">Generating large network topologies for GENI experiments</td>
    2814 </tr>
    2815 
    2816 <tr>
    2817      <td valign="top">Booktitle</td>
    2818      <td valign="top">SOUTHEASTCON 2014, IEEE</td>
    2819 </tr>
    2820 
    2821 <tr>
    2822      <td valign="top">Publisher</td>
    2823      <td valign="top">IEEE</td>
    2824 </tr>
    2825 
    2826 <tr>
    2827      <td valign="top">Year</td>
    2828      <td valign="top">2014</td>
    2829 </tr>
    2830 
    2831 <tr>
    2832      <td valign="top">Abstract</td>
    2833      <td valign="top">The Global Environment for Network Innovations (GENI) is a virtual laboratory which provides the infrastructure and resources for setting up network experiments. At present, GENI experimenters need to draw the topology in detail with a tool such as Flack, describing every node and every link in the experiment. This is not a problem for small-scale experiments. However, if an experiment needs a large-scale network topology, it is difficult for experimenters to accomplish the task. To deal with the problem, this paper develops a web application that can create large-scale network topologies in the GENI environment automatically. It makes use of existing network topology generators, such as GT-ITMand INET, and adapts them to be used in the GENI environment. The system can interface with GENI seamlessly. With the tool, the task of setting up large-scale experiments by GENI experimenters is made as easy as simply specifying high-level parameters of the topology.</td>
    2834 </tr>
    2835 
    2836 
    2837 
    2838 <tr>
    2839      <td valign="top">DOI</td>
    2840      <td valign="top">10.1109/secon.2014.6950726</td>
    2841 </tr>
    2842 
    2843 
    2844 
    2845 <tr>
    2846      <td valign="top">URL</td>
    2847      <td valign="top"><a href="http://dx.doi.org/10.1109/secon.2014.6950726">http://dx.doi.org/10.1109/secon.2014.6950726</a></td>
    2848 </tr>
    2849 
    2850 
    2851 </li>
    2852 
    2853 </table></div><br><br>
    2854 
    2855 
    2856 
    2857 
    2858 <a class="EntryGoto" id="Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning"></a>
    2859 <b class="myheading" style="position: relative; left: 5%;">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</b>
    2860 
    2861 <div class="BibEntry">
    2862 
    2863 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2864 
    2865 <li>
    2866 
    2867 
    2868 <tr>
    2869      <td valign="top">Author</td>
    2870      <td valign="top">Femminella, Mauro and Francescangeli, Roberto and Reali, Gianluca and Lee, Jae W. and Schulzrinne, Henning</td>
    2871 </tr>
    2872 
    2873 <tr>
    2874      <td valign="top">Title</td>
    2875      <td valign="top">An enabling platform for autonomic management of the future internet</td>
    2876 </tr>
    2877 
    2878 <tr>
    2879      <td valign="top">Journal</td>
    2880      <td valign="top">IEEE Network</td>
    2881 </tr>
    2882 
    2883 <tr>
    2884      <td valign="top">Year</td>
    2885      <td valign="top">2011</td>
    2886 </tr>
    2887 
    2888 <tr>
    2889      <td valign="top">Abstract</td>
    2890      <td valign="top">This article shows an autonomic management solution based on the recently defined programmable node architecture NetServ. The article starts with a general description of the classical network management requirements and their adaptation to the expected network evolution. After a description of the major issues characterizing the management of the expected Future Internet, the main autonomic management paradigms, and some recently introduced autonomic service platforms, we show and demonstrate the effectiveness of the NetServ architecture. Born as a means to deploy and execute networked services at runtime over programmable routers, NetServ has proved to be a suitable environment for hosting an autonomic management architecture.</td>
    2891 </tr>
    2892 
    2893 
    2894 
    2895 <tr>
    2896      <td valign="top">DOI</td>
    2897      <td valign="top">10.1109/MNET.2011.6085639</td>
    2898 </tr>
    2899 
    2900 
    2901 
    2902 <tr>
    2903      <td valign="top">URL</td>
    2904      <td valign="top"><a href="http://dx.doi.org/10.1109/MNET.2011.6085639">http://dx.doi.org/10.1109/MNET.2011.6085639</a></td>
    2905 </tr>
    2906 
    2907 
    2908 </li>
    2909 
    2910 </table></div><br><br>
    2911 
    2912 
    2913 
    2914 
    2915 <a class="EntryGoto" id="Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra"></a>
    2916 <b class="myheading" style="position: relative; left: 5%;">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</b>
    2917 
    2918 <div class="BibEntry">
    2919 
    2920 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2921 
    2922 <li>
    2923 
    2924 
    2925 <tr>
    2926      <td valign="top">Author</td>
    2927      <td valign="top">Fund, Fraida and Wang, Cong and Korakis, Thanasis and Zink, Michael and Panwar, Shivendra</td>
    2928 </tr>
    2929 
    2930 <tr>
    2931      <td valign="top">Title</td>
    2932      <td valign="top">GENI WiMAX Performance: Evaluation and Comparison of Two Campus Testbeds</td>
    2933 </tr>
    2934 
    2935 <tr>
    2936      <td valign="top">Booktitle</td>
    2937      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    2938 </tr>
    2939 
    2940 <tr>
    2941      <td valign="top">Location</td>
    2942      <td valign="top">Salt Lake City, UT</td>
    2943 </tr>
    2944 
    2945 <tr>
    2946      <td valign="top">Publisher</td>
    2947      <td valign="top">IEEE</td>
    2948 </tr>
    2949 
    2950 <tr>
    2951      <td valign="top">Year</td>
    2952      <td valign="top">2013</td>
    2953 </tr>
    2954 
    2955 
    2956 
    2957 <tr>
    2958      <td valign="top">DOI</td>
    2959      <td valign="top">10.1109/GREE.2013.23</td>
    2960 </tr>
    2961 
    2962 
    2963 
    2964 <tr>
    2965      <td valign="top">URL</td>
    2966      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.23">http://dx.doi.org/10.1109/GREE.2013.23</a></td>
    2967 </tr>
    2968 
    2969 
    2970 </li>
    2971 
    2972 </table></div><br><br>
    2973 
    2974 
    2975 
    2976 
    2977 <a class="EntryGoto" id="Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia"></a>
    2978 <b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b>
    2979 
    2980 <div class="BibEntry">
    2981 
    2982 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    2983 
    2984 <li>
    2985 
    2986 
    2987 <tr>
    2988      <td valign="top">Author</td>
    2989      <td valign="top">Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</td>
    2990 </tr>
    2991 
    2992 <tr>
    2993      <td valign="top">Title</td>
    2994      <td valign="top">Exercises for Graduate Students using GENI</td>
    2995 </tr>
    2996 
    2997 <tr>
    2998      <td valign="top">Booktitle</td>
    2999      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    3000 </tr>
    3001 
    3002 <tr>
    3003      <td valign="top">Location</td>
    3004      <td valign="top">Los Angeles</td>
    3005 </tr>
    3006 
    3007 <tr>
    3008      <td valign="top">Year</td>
    3009      <td valign="top">2012</td>
    3010 </tr>
    3011 
    3012 <tr>
    3013      <td valign="top">Abstract</td>
    3014      <td valign="top">GENI brings together a wide variety of heterogeneous networking infrastructure and technologies under a common platform. We propose programming exercises for graduate students to introduce GENI and enable students to conduct high fidelity networking experiments. In this paper, we focus on an exercise to study congestion control and reliability using the ProtoGENI aggregate. A planned second exercise aims to leverage GENI OpenFlow aggregates to study firewalls and QoS mechanisms. We believe that these lab exercises will expose students to key networking concepts and recent research directions, e.g., in the data center context.</td>
    3015 </tr>
    3016 
    3017 
    3018 
    3019 
    3020 
    3021 
    3022 </li>
    3023 
    3024 </table></div><br><br>
    3025 
    3026 
    3027 
    3028 
    3029 <a class="EntryGoto" id="Gangam, Sriharsha and Fahmy, Sonia"></a>
    3030 <b class="myheading" style="position: relative; left: 5%;">Gangam, Sriharsha and Fahmy, Sonia</b>
    3031 
    3032 <div class="BibEntry">
    3033 
    3034 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3035 
    3036 <li>
    3037 
    3038 
    3039 <tr>
    3040      <td valign="top">Author</td>
    3041      <td valign="top">Gangam, Sriharsha and Fahmy, Sonia</td>
    3042 </tr>
    3043 
    3044 <tr>
    3045      <td valign="top">Title</td>
    3046      <td valign="top">Mitigating interference in a network measurement service</td>
    3047 </tr>
    3048 
    3049 <tr>
    3050      <td valign="top">Booktitle</td>
    3051      <td valign="top">2011 IEEE Nineteenth IEEE International Workshop on Quality of Service</td>
    3052 </tr>
    3053 
    3054 <tr>
    3055      <td valign="top">Location</td>
    3056      <td valign="top">San Jose, CA, USA</td>
    3057 </tr>
    3058 
    3059 <tr>
    3060      <td valign="top">Publisher</td>
    3061      <td valign="top">IEEE</td>
    3062 </tr>
    3063 
    3064 <tr>
    3065      <td valign="top">Year</td>
    3066      <td valign="top">2011</td>
    3067 </tr>
    3068 
    3069 <tr>
    3070      <td valign="top">Abstract</td>
    3071      <td valign="top">Shared measurement services offer key advantages over conventional ad-hoc techniques for network monitoring. A measurement service may receive measurement requests concurrently from different applications and network administrators. These measurement requests are often served by injecting active network measurement traffic between two hosts. Two active measurements are said to interfere when the probe packets of one measurement tool are viewed as network traffic by the other. This may lead to faulty measurement readings. In this paper, we model the measurement interference problem, and show how to schedule measurement tasks to reduce interference and hence increase measurement accuracy. We propose twelve computationally tractable algorithms that decrease the total completion time (makespan) of measurement tasks, while avoiding interference. Our evaluation shows that the algorithm we refer to as Largest Area First, Busiest Node First - Earliest Interval Schedule (LAFBNF-EIS) has a mean makespan of about 5&#x0025; more than the theoretical lower bound over our set of measurement workloads.</td>
    3072 </tr>
    3073 
    3074 
    3075 
    3076 <tr>
    3077      <td valign="top">DOI</td>
    3078      <td valign="top">10.1109/IWQOS.2011.5931347</td>
    3079 </tr>
    3080 
    3081 
    3082 
    3083 <tr>
    3084      <td valign="top">URL</td>
    3085      <td valign="top"><a href="http://dx.doi.org/10.1109/IWQOS.2011.5931347">http://dx.doi.org/10.1109/IWQOS.2011.5931347</a></td>
    3086 </tr>
    3087 
    3088 
    3089 </li>
    3090 
    3091 </table></div><br><br>
    3092 
    3093 
    3094 
    3095 
    3096 <a class="EntryGoto" id="Gao, Jingcheng and Xiao, Yang"></a>
    3097 <b class="myheading" style="position: relative; left: 5%;">Gao, Jingcheng and Xiao, Yang</b>
    3098 
    3099 <div class="BibEntry">
    3100 
    3101 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3102 
    3103 <li>
    3104 
    3105 
    3106 <tr>
    3107      <td valign="top">Author</td>
    3108      <td valign="top">Gao, Jingcheng and Xiao, Yang</td>
    3109 </tr>
    3110 
    3111 <tr>
    3112      <td valign="top">Title</td>
    3113      <td valign="top">ProtoGENI DoS/DDoS Security Tests and Experiments</td>
    3114 </tr>
    3115 
    3116 <tr>
    3117      <td valign="top">Booktitle</td>
    3118      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    3119 </tr>
    3120 
    3121 <tr>
    3122      <td valign="top">Location</td>
    3123      <td valign="top">Los Angeles</td>
    3124 </tr>
    3125 
    3126 <tr>
    3127      <td valign="top">Year</td>
    3128      <td valign="top">2012</td>
    3129 </tr>
    3130 
    3131 <tr>
    3132      <td valign="top">Abstract</td>
    3133      <td valign="top">his paper will explain some tests and experiments to investigate selected security issues through ProtoGENI mainly during Spiral 3 time period and the beginning of Spiral 4. In this paper, we conduct multiple sets of DoS/ DDoS attacks in the current ProtoGENI testbed. These attacks show that it is very possible that ProtoGENI nodes may render vulnerabilities to such attacks.</td>
    3134 </tr>
    3135 
    3136 
    3137 
    3138 
    3139 
    3140 
    3141 </li>
    3142 
    3143 </table></div><br><br>
    3144 
    3145 
    3146 
    3147 
    3148 <a class="EntryGoto" id="Gember, Aaron and Dragga, Chris and Akella, Aditya"></a>
    3149 <b class="myheading" style="position: relative; left: 5%;">Gember, Aaron and Dragga, Chris and Akella, Aditya</b>
    3150 
    3151 <div class="BibEntry">
    3152 
    3153 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3154 
    3155 <li>
    3156 
    3157 
    3158 <tr>
    3159      <td valign="top">Author</td>
    3160      <td valign="top">Gember, Aaron and Dragga, Chris and Akella, Aditya</td>
    3161 </tr>
    3162 
    3163 <tr>
    3164      <td valign="top">Title</td>
    3165      <td valign="top">ECOS: Practical Mobile Application Offloading for Enterprises</td>
    3166 </tr>
    3167 
    3168 <tr>
    3169      <td valign="top">Booktitle</td>
    3170      <td valign="top">2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE '12)</td>
    3171 </tr>
    3172 
    3173 <tr>
    3174      <td valign="top">Year</td>
    3175      <td valign="top">2012</td>
    3176 </tr>
    3177 
    3178 <tr>
    3179      <td valign="top">Abstract</td>
    3180      <td valign="top">Offloading has emerged as a promising idea to allow handheld devices to access intensive applications without performance or energy costs. This could be particularly useful for enterprises seeking to run line-of-business applications on handhelds. However, we must address two practical roadblocks in order to make offloading amenable for enterprises: (i) ensuring data privacy and the use of trusted offloading resources, and (ii) accommodating offload at scale with diverse handheld objectives and compute resource capabilities. We present the design and implementation of an Enterprise-Centric Offloading System (ECOS) which augments prior offloading proposals to address these issues. ECOS uses a logically central controller to opportunistically leverage diverse compute resources, while tightly controlling where specific applications offload depending on privacy, performance, and energy constraints of users and applications. A wide range of experiments using a real prototype establish the effectiveness of our approach.</td>
    3181 </tr>
    3182 
    3183 
    3184 
    3185 
    3186 
    3187 <tr>
    3188      <td valign="top">URL</td>
    3189      <td valign="top"><a href="http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises">http://www.usenix.org/conference/hot-ice12/ecos-practical-mobile-application-of&#x0025;EF&#x0025;AC&#x0025;82oading-enterprises</a></td>
    3190 </tr>
    3191 
    3192 
    3193 </li>
    3194 
    3195 </table></div><br><br>
    3196 
    3197 
    3198 
    3199 
    3200 <a class="EntryGoto" id="Ghaffarinejad, A. and Syrotiuk, V. R."></a>
    3201 <b class="myheading" style="position: relative; left: 5%;">Ghaffarinejad, A. and Syrotiuk, V. R.</b>
    3202 
    3203 <div class="BibEntry">
    3204 
    3205 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3206 
    3207 <li>
    3208 
    3209 
    3210 <tr>
    3211      <td valign="top">Author</td>
    3212      <td valign="top">Ghaffarinejad, A. and Syrotiuk, V. R.</td>
    3213 </tr>
    3214 
    3215 <tr>
    3216      <td valign="top">Title</td>
    3217      <td valign="top">Load Balancing in a Campus Network Using Software Defined Networking</td>
    3218 </tr>
    3219 
    3220 <tr>
    3221      <td valign="top">Booktitle</td>
    3222      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    3223 </tr>
    3224 
    3225 <tr>
    3226      <td valign="top">Publisher</td>
    3227      <td valign="top">IEEE</td>
    3228 </tr>
    3229 
    3230 <tr>
    3231      <td valign="top">Year</td>
    3232      <td valign="top">2014</td>
    3233 </tr>
    3234 
    3235 <tr>
    3236      <td valign="top">Abstract</td>
    3237      <td valign="top">Today, commercial load balancers are often in use, including in the production network at Arizona State University (ASU). One of the main issues such load balancers face is that they use a static scheme for load distribution. However, at particular times of the academic year, such as during course registration, the network exhibits significant variations in both temporal and spatial traffic characteristics. At these times, students experience much greater latency and become frustrated with the network service. To address this problem, our aim is to develop an SDN-based approach to load balancing to better cope with the traffic variation.</td>
    3238 </tr>
    3239 
    3240 
    3241 
    3242 <tr>
    3243      <td valign="top">DOI</td>
    3244      <td valign="top">10.1109/gree.2014.9</td>
    3245 </tr>
    3246 
    3247 
    3248 
    3249 <tr>
    3250      <td valign="top">URL</td>
    3251      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.9">http://dx.doi.org/10.1109/gree.2014.9</a></td>
    3252 </tr>
    3253 
    3254 
    3255 </li>
    3256 
    3257 </table></div><br><br>
    3258 
    3259 
    3260 
    3261 
    3262 <a class="EntryGoto" id="Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David"></a>
    3263 <b class="myheading" style="position: relative; left: 5%;">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</b>
    3264 
    3265 <div class="BibEntry">
    3266 
    3267 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3268 
    3269 <li>
    3270 
    3271 
    3272 <tr>
    3273      <td valign="top">Author</td>
    3274      <td valign="top">Grandl, Robert and Han, Dongsu and Lee, Suk B. and Lim, Hyeontaek and Machado, Michel and Mukerjee, Matthew and Naylor, David</td>
    3275 </tr>
    3276 
    3277 <tr>
    3278      <td valign="top">Title</td>
    3279      <td valign="top">Supporting network evolution and incremental deployment with XIA</td>
    3280 </tr>
    3281 
    3282 <tr>
    3283      <td valign="top">Booktitle</td>
    3284      <td valign="top">Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication</td>
    3285 </tr>
    3286 
    3287 <tr>
    3288      <td valign="top">Location</td>
    3289      <td valign="top">Helsinki, Finland</td>
    3290 </tr>
    3291 
    3292 <tr>
    3293      <td valign="top">Publisher</td>
    3294      <td valign="top">ACM</td>
    3295 </tr>
    3296 
    3297 <tr>
    3298      <td valign="top">Address</td>
    3299      <td valign="top">New York, NY, USA</td>
    3300 </tr>
    3301 
    3302 <tr>
    3303      <td valign="top">Year</td>
    3304      <td valign="top">2012</td>
    3305 </tr>
    3306 
    3307 <tr>
    3308      <td valign="top">Abstract</td>
    3309      <td valign="top">eXpressive Internet Architecture (XIA) [1] is an architecture that natively supports multiple communication types and allows networks to evolve their abstractions and functionality to accommodate new styles of communication over time. XIA embeds an elegant mechanism for handling unforeseen communication types for legacy routers. In this demonstration, we show that XIA overcomes three key barriers in network evolution (outlined below) by (1) allowing end-hosts and applications to start using new communication types (e.g., service and content) before the network supports them, (2) ensuring that upgrading a subset of routers to support new functionalities immediately benefits applications, and (3) using the same mechanisms we employ for 1 and 2 to incrementally deploy XIA in IP networks.</td>
    3310 </tr>
    3311 
    3312 
    3313 
    3314 <tr>
    3315      <td valign="top">DOI</td>
    3316      <td valign="top">10.1145/2342356.2342410</td>
    3317 </tr>
    3318 
    3319 
    3320 
    3321 <tr>
    3322      <td valign="top">URL</td>
    3323      <td valign="top"><a href="http://dx.doi.org/10.1145/2342356.2342410">http://dx.doi.org/10.1145/2342356.2342410</a></td>
    3324 </tr>
    3325 
    3326 
    3327 </li>
    3328 
    3329 </table></div><br><br>
    3330 
    3331 
    3332 
    3333 
    3334 <a class="EntryGoto" id="Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C."></a>
    3335 <b class="myheading" style="position: relative; left: 5%;">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>
    3336 
    3337 <div class="BibEntry">
    3338 
    3339 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3340 
    3341 <li>
    3342 
    3343 
    3344 <tr>
    3345      <td valign="top">Author</td>
    3346      <td valign="top">Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</td>
    3347 </tr>
    3348 
    3349 <tr>
    3350      <td valign="top">Title</td>
    3351      <td valign="top">The design of an instrumentation system for federated and virtualized network testbeds</td>
    3352 </tr>
    3353 
    3354 <tr>
    3355      <td valign="top">Booktitle</td>
    3356      <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
    3357 </tr>
    3358 
    3359 <tr>
    3360      <td valign="top">Publisher</td>
    3361      <td valign="top">IEEE</td>
    3362 </tr>
    3363 
    3364 <tr>
    3365      <td valign="top">Year</td>
    3366      <td valign="top">2012</td>
    3367 </tr>
    3368 
    3369 <tr>
    3370      <td valign="top">Abstract</td>
    3371      <td valign="top">Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.</td>
    3372 </tr>
    3373 
    3374 
    3375 
    3376 <tr>
    3377      <td valign="top">DOI</td>
    3378      <td valign="top">10.1109/NOMS.2012.6212061</td>
    3379 </tr>
    3380 
    3381 
    3382 
    3383 <tr>
    3384      <td valign="top">URL</td>
    3385      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a></td>
    3386 </tr>
    3387 
    3388 
    3389 </li>
    3390 
    3391 </table></div><br><br>
    3392 
    3393 
    3394 
    3395 
    3396 <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
    3397 <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
    3398 
    3399 <div class="BibEntry">
    3400 
    3401 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3402 
    3403 <li>
    3404 
    3405 
    3406 <tr>
    3407      <td valign="top">Author</td>
    3408      <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
    3409 </tr>
    3410 
    3411 <tr>
    3412      <td valign="top">Title</td>
    3413      <td valign="top">Measuring experiments in GENI</td>
    3414 </tr>
    3415 
    3416 <tr>
    3417      <td valign="top">Journal</td>
    3418      <td valign="top">Computer Networks</td>
    3419 </tr>
    3420 
    3421 <tr>
    3422      <td valign="top">Year</td>
    3423      <td valign="top">2014</td>
    3424 </tr>
    3425 
    3426 <tr>
    3427      <td valign="top">Abstract</td>
    3428      <td valign="top">Experimentation with new network architectures and protocols is one of the primary motivations for building future Internet testbeds such as the Global Environment for Network Innovations (GENI) testbed. A key part of experimentation is the ability to observe, measure, evaluate, and compare these new architectures and protocols. Observing an experiment's network performance requires setting up the measurement infrastructure needed to monitor and record the behavior of the network. It also requires a full set of tools and user interfaces that enable access to the measurement data both while the experiment is running and later during post-analysis. To simplify the task of measuring experiments in future Internet testbeds like GENI, we developed an instrumentation and measurement system called INSTOOLS. It automates the process of setting up the measurement infrastructure, tailoring the measurement infrastructure and the data capture to the experimental network's topology and configuration. In addition, INSTOOLS provides a suite of tools via its ” portal” service that make it easy for users to observe, measure, format, and archive data from their experiments. This paper describes the INSTOOLS system and the set of interfaces/tools it offers to users. INSTOOLS has been in use for several years, and we provide performance results that illustrate its scalability. We also present our second-generation portal, the GENI One Stop Portal, that offers a comprehensive interface to a wide range of tools.</td>
    3429 </tr>
    3430 
    3431 
    3432 
    3433 <tr>
    3434      <td valign="top">DOI</td>
    3435      <td valign="top">10.1016/j.bjp.2013.10.016</td>
    3436 </tr>
    3437 
    3438 
    3439 
    3440 <tr>
    3441      <td valign="top">URL</td>
    3442      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.10.016">http://dx.doi.org/10.1016/j.bjp.2013.10.016</a></td>
    3443 </tr>
    3444 
    3445 
    3446 </li>
    3447 
    3448 </table></div><br><br>
    3449 
    3450 
    3451 <div class="BibEntry">
    3452 
    3453 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3454 
    3455 <li>
    3456 
    3457 
    3458 <tr>
    3459      <td valign="top">Author</td>
    3460      <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
    3461 </tr>
    3462 
    3463 <tr>
    3464      <td valign="top">Title</td>
    3465      <td valign="top">GENI-enabled Programming Experiments for Networking Classes</td>
    3466 </tr>
    3467 
    3468 <tr>
    3469      <td valign="top">Booktitle</td>
    3470      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    3471 </tr>
    3472 
    3473 <tr>
    3474      <td valign="top">Location</td>
    3475      <td valign="top">Salt Lake City, UT</td>
    3476 </tr>
    3477 
    3478 <tr>
    3479      <td valign="top">Publisher</td>
    3480      <td valign="top">IEEE</td>
    3481 </tr>
    3482 
    3483 <tr>
    3484      <td valign="top">Year</td>
    3485      <td valign="top">2013</td>
    3486 </tr>
    3487 
    3488 
    3489 
    3490 <tr>
    3491      <td valign="top">DOI</td>
    3492      <td valign="top">10.1109/GREE.2013.30</td>
    3493 </tr>
    3494 
    3495 
    3496 
    3497 <tr>
    3498      <td valign="top">URL</td>
    3499      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.30">http://dx.doi.org/10.1109/GREE.2013.30</a></td>
    3500 </tr>
    3501 
    3502 
    3503 </li>
    3504 
    3505 </table></div><br><br>
    3506 
    3507 
    3508 
    3509 
    3510 <a class="EntryGoto" id="Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles"></a>
    3511 <b class="myheading" style="position: relative; left: 5%;">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</b>
    3512 
    3513 <div class="BibEntry">
    3514 
    3515 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3516 
    3517 <li>
    3518 
    3519 
    3520 <tr>
    3521      <td valign="top">Author</td>
    3522      <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussanmuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td>
    3523 </tr>
    3524 
    3525 <tr>
    3526      <td valign="top">Title</td>
    3527      <td valign="top">Teaching with the Emerging GENI Network</td>
    3528 </tr>
    3529 
    3530 <tr>
    3531      <td valign="top">Booktitle</td>
    3532      <td valign="top">Proceedings of the 2012 International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS)</td>
    3533 </tr>
    3534 
    3535 <tr>
    3536      <td valign="top">Location</td>
    3537      <td valign="top">Las Vegas</td>
    3538 </tr>
    3539 
    3540 <tr>
    3541      <td valign="top">Year</td>
    3542      <td valign="top">2012</td>
    3543 </tr>
    3544 
    3545 
    3546 
    3547 
    3548 
    3549 
    3550 </li>
    3551 
    3552 </table></div><br><br>
    3553 
    3554 
    3555 
    3556 
    3557 <a class="EntryGoto" id="Group, GENI Planning"></a>
    3558 <b class="myheading" style="position: relative; left: 5%;">Group, GENI Planning</b>
    3559 
    3560 <div class="BibEntry">
    3561 
    3562 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3563 
    3564 <li>
    3565 
    3566 
    3567 <tr>
    3568      <td valign="top">Author</td>
    3569      <td valign="top">Group, GENI Planning</td>
    3570 </tr>
    3571 
    3572 <tr>
    3573      <td valign="top">Title</td>
    3574      <td valign="top">GENI Design Principles</td>
    3575 </tr>
    3576 
    3577 <tr>
    3578      <td valign="top">Journal</td>
    3579      <td valign="top">Computer</td>
    3580 </tr>
    3581 
    3582 <tr>
    3583      <td valign="top">Publisher</td>
    3584      <td valign="top">IEEE</td>
    3585 </tr>
    3586 
    3587 <tr>
    3588      <td valign="top">Year</td>
    3589      <td valign="top">2006</td>
    3590 </tr>
    3591 
    3592 <tr>
    3593      <td valign="top">Abstract</td>
    3594      <td valign="top">The Global Environment for Network Innovations is a major planned initiative of the US National Science Foundation to build an open, large-scale, realistic experimental facility for evaluating new network architectures. The facility's goal is to change the way we design networked and distributed systems, creating over time new paradigms that integrate rigorous theoretical understanding with compelling and thorough experimental validation. The research that GENI enables can lead to a future Internet that is more secure, available, manageable, and efficient, and better at handling mobile nodes. GENI is intended to support two general kinds of activities: running controlled experiments to evaluate design, implementation, and engineering choices; and deploying prototype systems and learning from observations of how they behave under real usage</td>
    3595 </tr>
    3596 
    3597 
    3598 
    3599 <tr>
    3600      <td valign="top">DOI</td>
    3601      <td valign="top">10.1109/mc.2006.307</td>
    3602 </tr>
    3603 
    3604 
    3605 
    3606 <tr>
    3607      <td valign="top">URL</td>
    3608      <td valign="top"><a href="http://dx.doi.org/10.1109/mc.2006.307">http://dx.doi.org/10.1109/mc.2006.307</a></td>
    3609 </tr>
    3610 
    3611 
    3612 </li>
    3613 
    3614 </table></div><br><br>
    3615 
    3616 
    3617 
    3618 
    3619 <a class="EntryGoto" id="Guan, Xinjie and Choi, Baek-Young and Song, Sejun"></a>
    3620 <b class="myheading" style="position: relative; left: 5%;">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</b>
    3621 
    3622 <div class="BibEntry">
    3623 
    3624 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3625 
    3626 <li>
    3627 
    3628 
    3629 <tr>
    3630      <td valign="top">Author</td>
    3631      <td valign="top">Guan, Xinjie and Choi, Baek-Young and Song, Sejun</td>
    3632 </tr>
    3633 
    3634 <tr>
    3635      <td valign="top">Title</td>
    3636      <td valign="top">Reliability and Scalability Issues in Software Defined Network Frameworks</td>
    3637 </tr>
    3638 
    3639 <tr>
    3640      <td valign="top">Booktitle</td>
    3641      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    3642 </tr>
    3643 
    3644 <tr>
    3645      <td valign="top">Location</td>
    3646      <td valign="top">Salt Lake City, UT</td>
    3647 </tr>
    3648 
    3649 <tr>
    3650      <td valign="top">Publisher</td>
    3651      <td valign="top">IEEE</td>
    3652 </tr>
    3653 
    3654 <tr>
    3655      <td valign="top">Year</td>
    3656      <td valign="top">2013</td>
    3657 </tr>
    3658 
    3659 
    3660 
    3661 <tr>
    3662      <td valign="top">DOI</td>
    3663      <td valign="top">10.1109/GREE.2013.28</td>
    3664 </tr>
    3665 
    3666 
    3667 
    3668 <tr>
    3669      <td valign="top">URL</td>
    3670      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.28">http://dx.doi.org/10.1109/GREE.2013.28</a></td>
    3671 </tr>
    3672 
    3673 
    3674 </li>
    3675 
    3676 </table></div><br><br>
    3677 
    3678 
    3679 
    3680 
    3681 <a class="EntryGoto" id="Herron, Jon-Paul"></a>
    3682 <b class="myheading" style="position: relative; left: 5%;">Herron, Jon-Paul</b>
    3683 
    3684 <div class="BibEntry">
    3685 
    3686 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3687 
    3688 <li>
    3689 
    3690 
    3691 <tr>
    3692      <td valign="top">Author</td>
    3693      <td valign="top">Herron, Jon-Paul</td>
    3694 </tr>
    3695 
    3696 <tr>
    3697      <td valign="top">Title</td>
    3698      <td valign="top">GENI Meta-Operations Center</td>
    3699 </tr>
    3700 
    3701 <tr>
    3702      <td valign="top">Booktitle</td>
    3703      <td valign="top">2008 IEEE Fourth International Conference on eScience</td>
    3704 </tr>
    3705 
    3706 <tr>
    3707      <td valign="top">Location</td>
    3708      <td valign="top">Indianapolis, IN, USA</td>
    3709 </tr>
    3710 
    3711 <tr>
    3712      <td valign="top">Publisher</td>
    3713      <td valign="top">IEEE</td>
    3714 </tr>
    3715 
    3716 <tr>
    3717      <td valign="top">Year</td>
    3718      <td valign="top">2008</td>
    3719 </tr>
    3720 
    3721 <tr>
    3722      <td valign="top">Abstract</td>
    3723      <td valign="top">NSF's GENI program represents an opportunity to build the kind of programmable, virtualized testbed scientists exploring the future of networking will need to support their research. As with any other scientific instrument, it will be crucial that the GENI infrastructure offer repeatable, consistent results to the researchers using it.The GENI Meta-Operations Center, operated by the Global Research NOC at Indiana University, will develop the software, protocols, and processes needed to ensure the repeatability, consistency, and efficiency of GENI.</td>
    3724 </tr>
    3725 
    3726 
    3727 
    3728 <tr>
    3729      <td valign="top">DOI</td>
    3730      <td valign="top">10.1109/eScience.2008.103</td>
    3731 </tr>
    3732 
    3733 
    3734 
    3735 <tr>
    3736      <td valign="top">URL</td>
    3737      <td valign="top"><a href="http://dx.doi.org/10.1109/eScience.2008.103">http://dx.doi.org/10.1109/eScience.2008.103</a></td>
    3738 </tr>
    3739 
    3740 
    3741 </li>
    3742 
    3743 </table></div><br><br>
    3744 
    3745 
    3746 
    3747 
    3748 <a class="EntryGoto" id="Huang, Shu and Xu, Hao and Xin, Yufeng and Brieger, L. and Moore, R. and Rajasekar, A."></a>
    3749 <b class="myheading" style="position: relative; left: 5%;">Huang, Shu and Xu, Hao and Xin, Yufeng and Brieger, L. and Moore, R. and Rajasekar, A.</b>
    3750 
    3751 <div class="BibEntry">
    3752 
    3753 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3754 
    3755 <li>
    3756 
    3757 
    3758 <tr>
    3759      <td valign="top">Author</td>
    3760      <td valign="top">Huang, Shu and Xu, Hao and Xin, Yufeng and Brieger, L. and Moore, R. and Rajasekar, A.</td>
    3761 </tr>
    3762 
    3763 <tr>
    3764      <td valign="top">Title</td>
    3765      <td valign="top">A Framework for Integration of Rule-Oriented Data Management Policies with Network Policies</td>
    3766 </tr>
    3767 
    3768 <tr>
    3769      <td valign="top">Booktitle</td>
    3770      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    3771 </tr>
    3772 
    3773 <tr>
    3774      <td valign="top">Publisher</td>
    3775      <td valign="top">IEEE</td>
    3776 </tr>
    3777 
    3778 <tr>
    3779      <td valign="top">Year</td>
    3780      <td valign="top">2014</td>
    3781 </tr>
    3782 
    3783 <tr>
    3784      <td valign="top">Abstract</td>
    3785      <td valign="top">Traditionally data management software running on top of the Internet has very limited primitives to interact with the networking layer. This limitation has become a major road-block to develop next generation data management applications requiring high-bandwidth and dynamic network configuration. In this work, we present a policy-driven software framework that acts as an adaptation layer between the data management software and SDN networks. This framework allows a tight coupling between the data grid and the network and therefore makes complex workflow-like cross-layer computation possible. We have prototyped this adaptation layer integrated with iRODS, a popular policy-driven data grid software and Floodlight, a popular OpenFlow controller, and demonstrate how network policies become part of the overall data grid policies to improve the application performance.</td>
    3786 </tr>
    3787 
    3788 
    3789 
    3790 <tr>
    3791      <td valign="top">DOI</td>
    3792      <td valign="top">10.1109/gree.2014.19</td>
    3793 </tr>
    3794 
    3795 
    3796 
    3797 <tr>
    3798      <td valign="top">URL</td>
    3799      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.19">http://dx.doi.org/10.1109/gree.2014.19</a></td>
    3800 </tr>
    3801 
    3802 
    3803 </li>
    3804 
    3805 </table></div><br><br>
    3806 
    3807 
    3808 
    3809 
    3810 <a class="EntryGoto" id="Huang, Shufeng and Griffioen, James and Calvert, Kenneth L."></a>
    3811 <b class="myheading" style="position: relative; left: 5%;">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</b>
    3812 
    3813 <div class="BibEntry">
    3814 
    3815 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3816 
    3817 <li>
    3818 
    3819 
    3820 <tr>
    3821      <td valign="top">Author</td>
    3822      <td valign="top">Huang, Shufeng and Griffioen, James and Calvert, Kenneth L.</td>
    3823 </tr>
    3824 
    3825 <tr>
    3826      <td valign="top">Title</td>
    3827      <td valign="top">Fast-tracking GENI Experiments using HyperNets</td>
    3828 </tr>
    3829 
    3830 <tr>
    3831      <td valign="top">Booktitle</td>
    3832      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    3833 </tr>
    3834 
    3835 <tr>
    3836      <td valign="top">Location</td>
    3837      <td valign="top">Salt Lake City, UT</td>
    3838 </tr>
    3839 
    3840 <tr>
    3841      <td valign="top">Publisher</td>
    3842      <td valign="top">IEEE</td>
    3843 </tr>
    3844 
    3845 <tr>
    3846      <td valign="top">Year</td>
    3847      <td valign="top">2013</td>
    3848 </tr>
    3849 
    3850 
    3851 
    3852 <tr>
    3853      <td valign="top">DOI</td>
    3854      <td valign="top">10.1109/GREE.2013.10</td>
    3855 </tr>
    3856 
    3857 
    3858 
    3859 <tr>
    3860      <td valign="top">URL</td>
    3861      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.10">http://dx.doi.org/10.1109/GREE.2013.10</a></td>
    3862 </tr>
    3863 
    3864 
    3865 </li>
    3866 
    3867 </table></div><br><br>
    3868 
    3869 
    3870 
    3871 
    3872 <a class="EntryGoto" id="Jin, Ruofan and Wang, Bing"></a>
    3873 <b class="myheading" style="position: relative; left: 5%;">Jin, Ruofan and Wang, Bing</b>
    3874 
    3875 <div class="BibEntry">
    3876 
    3877 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3878 
    3879 <li>
    3880 
    3881 
    3882 <tr>
    3883      <td valign="top">Author</td>
    3884      <td valign="top">Jin, Ruofan and Wang, Bing</td>
    3885 </tr>
    3886 
    3887 <tr>
    3888      <td valign="top">Title</td>
    3889      <td valign="top">Malware Detection for Mobile Devices Using Software-Defined Networking</td>
    3890 </tr>
    3891 
    3892 <tr>
    3893      <td valign="top">Booktitle</td>
    3894      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    3895 </tr>
    3896 
    3897 <tr>
    3898      <td valign="top">Location</td>
    3899      <td valign="top">Salt Lake City, UT</td>
    3900 </tr>
    3901 
    3902 <tr>
    3903      <td valign="top">Publisher</td>
    3904      <td valign="top">IEEE</td>
    3905 </tr>
    3906 
    3907 <tr>
    3908      <td valign="top">Year</td>
    3909      <td valign="top">2013</td>
    3910 </tr>
    3911 
    3912 
    3913 
    3914 <tr>
    3915      <td valign="top">DOI</td>
    3916      <td valign="top">10.1109/GREE.2013.24</td>
    3917 </tr>
    3918 
    3919 
    3920 
    3921 <tr>
    3922      <td valign="top">URL</td>
    3923      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.24">http://dx.doi.org/10.1109/GREE.2013.24</a></td>
    3924 </tr>
    3925 
    3926 
    3927 </li>
    3928 
    3929 </table></div><br><br>
    3930 
    3931 
    3932 
    3933 
    3934 <a class="EntryGoto" id="Jofre, Jordi and Velayos, Celia and Landi, Giada and Giertych, Micha&#x0142; and Hume, Alastair C. and Francis, Gareth and Vico Oton, Albert"></a>
    3935 <b class="myheading" style="position: relative; left: 5%;">Jofre, Jordi and Velayos, Celia and Landi, Giada and Giertych, Micha&#x0142; and Hume, Alastair C. and Francis, Gareth and Vico Oton, Albert</b>
    3936 
    3937 <div class="BibEntry">
    3938 
    3939 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3940 
    3941 <li>
    3942 
    3943 
    3944 <tr>
    3945      <td valign="top">Author</td>
    3946      <td valign="top">Jofre, Jordi and Velayos, Celia and Landi, Giada and Giertych, Micha&#x0142; and Hume, Alastair C. and Francis, Gareth and Vico Oton, Albert</td>
    3947 </tr>
    3948 
    3949 <tr>
    3950      <td valign="top">Title</td>
    3951      <td valign="top">Federation of the BonFIRE multi-cloud infrastructure with networking facilities</td>
    3952 </tr>
    3953 
    3954 <tr>
    3955      <td valign="top">Journal</td>
    3956      <td valign="top">Computer Networks</td>
    3957 </tr>
    3958 
    3959 <tr>
    3960      <td valign="top">Year</td>
    3961      <td valign="top">2014</td>
    3962 </tr>
    3963 
    3964 <tr>
    3965      <td valign="top">Abstract</td>
    3966      <td valign="top">Network performance in terms of throughput, latency, packet loss or jitter significantly influences user's quality of experience of cloud applications. Network services impact on cloud applications performance and this impact is even more significant when the cloud infrastructure spreads over different administrative domains, such as in a federated cloud or hybrid-cloud scenarios. Given this strong coupling between cloud application performance and network performance there is great value to be gained by supporting advanced controlled networking functionalities between distributed cloud infrastructures. These functionalities would be useful to the Future Internet (FI) experimentation community as well as future production clouds. This paper describes an architecture and a set of procedures to interconnect a multi-cloud environment with advanced facilities for controlled networking. This integration allows the provisioning of customized network functions and services in support of experiments running in a multi-cloud test-bed. The possibility to control the network connectivity is a key feature to provide better performance for the experimenters' cloud applications. We focus on the details of federating three advanced networking facilities with the BonFIRE multi-cloud environment. These three networking facilities are: FEDERICA, which supports controlled routing; G&#x45;&#x0301;ANT's Bandwidth-on-Demand service and OFELIA that uses OpenFlow to provide Software Defined Network functionalities. The interconnections with FEDERICA and G&#x45;&#x0301;ANT are already active, while OFELIA is envisaged as future work for a third facility to interconnect.</td>
    3967 </tr>
    3968 
    3969 
    3970 
    3971 <tr>
    3972      <td valign="top">DOI</td>
    3973      <td valign="top">10.1016/j.bjp.2013.11.012</td>
    3974 </tr>
    3975 
    3976 
    3977 
    3978 <tr>
    3979      <td valign="top">URL</td>
    3980      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.11.012">http://dx.doi.org/10.1016/j.bjp.2013.11.012</a></td>
    3981 </tr>
    3982 
    3983 
    3984 </li>
    3985 
    3986 </table></div><br><br>
    3987 
    3988 
    3989 
    3990 
    3991 <a class="EntryGoto" id="Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng"></a>
    3992 <b class="myheading" style="position: relative; left: 5%;">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</b>
    3993 
    3994 <div class="BibEntry">
    3995 
    3996 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    3997 
    3998 <li>
    3999 
    4000 
    4001 <tr>
    4002      <td valign="top">Author</td>
    4003      <td valign="top">Ju, Xi and Zhang, Hongwei and Zeng, Wenjie and Sridharan, Mukundan and Li, Jing and Arora, Anish and Ramnath, Rajiv and Xin, Yufeng</td>
    4004 </tr>
    4005 
    4006 <tr>
    4007      <td valign="top">Title</td>
    4008      <td valign="top">LENS: resource specification for wireless sensor network experimentation infrastructures</td>
    4009 </tr>
    4010 
    4011 <tr>
    4012      <td valign="top">Booktitle</td>
    4013      <td valign="top">Proceedings of the 6th ACM international workshop on Wireless network testbeds, experimental evaluation and characterization</td>
    4014 </tr>
    4015 
    4016 <tr>
    4017      <td valign="top">Location</td>
    4018      <td valign="top">Las Vegas, Nevada, USA</td>
    4019 </tr>
    4020 
    4021 <tr>
    4022      <td valign="top">Publisher</td>
    4023      <td valign="top">ACM</td>
    4024 </tr>
    4025 
    4026 <tr>
    4027      <td valign="top">Address</td>
    4028      <td valign="top">New York, NY, USA</td>
    4029 </tr>
    4030 
    4031 <tr>
    4032      <td valign="top">Year</td>
    4033      <td valign="top">2011</td>
    4034 </tr>
    4035 
    4036 <tr>
    4037      <td valign="top">Abstract</td>
    4038      <td valign="top">As a first step towards predictable, repeatable WSN experimentation, we propose the resource specification language LENS (a.k.a. Language for Embedded Networked Sensing) for WSN experimentation infrastructures. Using the Resource Description Framework (RDF) and the Web Ontology Language (OWL), LENS defines a semantic ontology for WSN resources; LENS enables explicit control and measurement of uncertainty factors, and it enables reasoning about the relationships between WSN resources. Focusing on basic concepts of WSNs, LENS supports resource specification in a wide range of WSN experimentation infrastructures, and it is extensible to support potentially unforeseen technologies. LENS is also compatible with specification languages for other network resources such as optical networks. As a part of the NSF GENI initiative, we have implemented LENS in the KanseiGenie control framework, and LENS has been actively used to support experimentation in the federated WSN infrastructure involving Kansei and NetEye. Enabling reasoning about uncertainty factors in experimentation, LENS is expected to serve as a basis for developing methodologies and tools for predictable, repeatable WSN experimentation.</td>
    4039 </tr>
    4040 
    4041 
    4042 
    4043 <tr>
    4044      <td valign="top">DOI</td>
    4045      <td valign="top">10.1145/2030718.2030727</td>
    4046 </tr>
    4047 
    4048 
    4049 
    4050 <tr>
    4051      <td valign="top">URL</td>
    4052      <td valign="top"><a href="http://dx.doi.org/10.1145/2030718.2030727">http://dx.doi.org/10.1145/2030718.2030727</a></td>
    4053 </tr>
    4054 
    4055 
    4056 </li>
    4057 
    4058 </table></div><br><br>
    4059 
    4060 
    4061 
    4062 
    4063 <a class="EntryGoto" id="Kangarlou, A. and Xu, Dongyan and Kozat, U. C. and Padala, P. and Lantz, B. and Igarashi, K."></a>
    4064 <b class="myheading" style="position: relative; left: 5%;">Kangarlou, A. and Xu, Dongyan and Kozat, U. C. and Padala, P. and Lantz, B. and Igarashi, K.</b>
    4065 
    4066 <div class="BibEntry">
    4067 
    4068 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4069 
    4070 <li>
    4071 
    4072 
    4073 <tr>
    4074      <td valign="top">Author</td>
    4075      <td valign="top">Kangarlou, A. and Xu, Dongyan and Kozat, U. C. and Padala, P. and Lantz, B. and Igarashi, K.</td>
    4076 </tr>
    4077 
    4078 <tr>
    4079      <td valign="top">Title</td>
    4080      <td valign="top">In-network live snapshot service for recovering virtual infrastructures</td>
    4081 </tr>
    4082 
    4083 <tr>
    4084      <td valign="top">Journal</td>
    4085      <td valign="top">Network, IEEE</td>
    4086 </tr>
    4087 
    4088 <tr>
    4089      <td valign="top">Publisher</td>
    4090      <td valign="top">IEEE</td>
    4091 </tr>
    4092 
    4093 <tr>
    4094      <td valign="top">Year</td>
    4095      <td valign="top">2011</td>
    4096 </tr>
    4097 
    4098 <tr>
    4099      <td valign="top">Abstract</td>
    4100      <td valign="top">Infrastructure as a Service (IaaS) has become an increasingly popular type of service for both private and public clouds. The virtual infrastructures that enable IaaS support multitenancy by multiplexing the computational resources of data centers and result in substantial reductions in operational costs. Since hardware and software failures occur on a routine basis in large-scale systems, it is imperative for cloud providers to offer various failure recovery options for distributed services hosted on such infrastructures. In this article we present GENI-VIOLIN, a new cloud capability that can checkpoint a stateful distributed service while incurring very low overhead. The unique aspect of GENI-VIOLIN compared to previous work is that GENI-VIOLIN exploits programmable OpenFlow switches to provide checkpointing services in the network, thereby requiring minimal changes to the end host virtualization framework. We have developed a prototype of GENI-VIOLIN using the GENI infrastructure, and have demonstrated GENI-VIOLIN's checkpoint and restore capability across multiple GENI sites.</td>
    4101 </tr>
    4102 
    4103 
    4104 
    4105 <tr>
    4106      <td valign="top">DOI</td>
    4107      <td valign="top">10.1109/mnet.2011.5958003</td>
    4108 </tr>
    4109 
    4110 
    4111 
    4112 <tr>
    4113      <td valign="top">URL</td>
    4114      <td valign="top"><a href="http://dx.doi.org/10.1109/mnet.2011.5958003">http://dx.doi.org/10.1109/mnet.2011.5958003</a></td>
    4115 </tr>
    4116 
    4117 
    4118 </li>
    4119 
    4120 </table></div><br><br>
    4121 
    4122 
    4123 
    4124 
    4125 <a class="EntryGoto" id="Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten"></a>
    4126 <b class="myheading" style="position: relative; left: 5%;">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</b>
    4127 
    4128 <div class="BibEntry">
    4129 
    4130 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4131 
    4132 <li>
    4133 
    4134 
    4135 <tr>
    4136      <td valign="top">Author</td>
    4137      <td valign="top">Khurshid, Ahmed and Zhou, Wenxuan and Caesar, Matthew and Godfrey, P. Brighten</td>
    4138 </tr>
    4139 
    4140 <tr>
    4141      <td valign="top">Title</td>
    4142      <td valign="top">VeriFlow: verifying network-wide invariants in real time</td>
    4143 </tr>
    4144 
    4145 <tr>
    4146      <td valign="top">Booktitle</td>
    4147      <td valign="top">Proceedings of the first workshop on Hot topics in software defined networks</td>
    4148 </tr>
    4149 
    4150 <tr>
    4151      <td valign="top">Location</td>
    4152      <td valign="top">Helsinki, Finland</td>
    4153 </tr>
    4154 
    4155 <tr>
    4156      <td valign="top">Publisher</td>
    4157      <td valign="top">ACM</td>
    4158 </tr>
    4159 
    4160 <tr>
    4161      <td valign="top">Address</td>
    4162      <td valign="top">New York, NY, USA</td>
    4163 </tr>
    4164 
    4165 <tr>
    4166      <td valign="top">Year</td>
    4167      <td valign="top">2012</td>
    4168 </tr>
    4169 
    4170 
    4171 
    4172 <tr>
    4173      <td valign="top">DOI</td>
    4174      <td valign="top">10.1145/2342441.2342452</td>
    4175 </tr>
    4176 
    4177 
    4178 
    4179 <tr>
    4180      <td valign="top">URL</td>
    4181      <td valign="top"><a href="http://doi.acm.org/10.1145/2342441.2342452">http://doi.acm.org/10.1145/2342441.2342452</a></td>
    4182 </tr>
    4183 
    4184 
    4185 </li>
    4186 
    4187 </table></div><br><br>
    4188 
    4189 
    4190 
    4191 
    4192 <a class="EntryGoto" id="Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki"></a>
    4193 <b class="myheading" style="position: relative; left: 5%;">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</b>
    4194 
    4195 <div class="BibEntry">
    4196 
    4197 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4198 
    4199 <li>
    4200 
    4201 
    4202 <tr>
    4203      <td valign="top">Author</td>
    4204      <td valign="top">Kim, Dae Y. and Mathy, Laurent and Campanella, Mauro and Summerhill, Rick and Williams, James and Shimojo, Shinji and Kitamura, Yasuichi and Otsuki, Hideaki</td>
    4205 </tr>
    4206 
    4207 <tr>
    4208      <td valign="top">Title</td>
    4209      <td valign="top">Future Internet: Challenges in Virtualization and Federation</td>
    4210 </tr>
    4211 
    4212 <tr>
    4213      <td valign="top">Booktitle</td>
    4214      <td valign="top">2009 Fifth Advanced International Conference on Telecommunications</td>
    4215 </tr>
    4216 
    4217 <tr>
    4218      <td valign="top">Location</td>
    4219      <td valign="top">Venice/Mestre, Italy</td>
    4220 </tr>
    4221 
    4222 <tr>
    4223      <td valign="top">Publisher</td>
    4224      <td valign="top">IEEE</td>
    4225 </tr>
    4226 
    4227 <tr>
    4228      <td valign="top">Year</td>
    4229      <td valign="top">2009</td>
    4230 </tr>
    4231 
    4232 <tr>
    4233      <td valign="top">Abstract</td>
    4234      <td valign="top">Future Internet is a clean-slate research activity in the quest of new networking technologies to overcome the limits of the current Internet. In its experimental research, virtualization and federation are emerging as essential features, especially in the construction and operation of the testbeds. Moreover, they are believed to sustain as the fundamental features of the Future Internet itself. Visions and experiences on virtualization and federation are given by leading experts from US, EU, and Asia.</td>
    4235 </tr>
    4236 
    4237 
    4238 
    4239 <tr>
    4240      <td valign="top">DOI</td>
    4241      <td valign="top">10.1109/AICT.2009.8</td>
    4242 </tr>
    4243 
    4244 
    4245 
    4246 <tr>
    4247      <td valign="top">URL</td>
    4248      <td valign="top"><a href="http://dx.doi.org/10.1109/AICT.2009.8">http://dx.doi.org/10.1109/AICT.2009.8</a></td>
    4249 </tr>
    4250 
    4251 
    4252 </li>
    4253 
    4254 </table></div><br><br>
    4255 
    4256 
    4257 
    4258 
    4259 <a class="EntryGoto" id="Kim, Dongkyun and Kim, Joobum and Wang, Gicheol and Park, Jin-Hyung and Kim, Seung-Hae"></a>
    4260 <b class="myheading" style="position: relative; left: 5%;">Kim, Dongkyun and Kim, Joobum and Wang, Gicheol and Park, Jin-Hyung and Kim, Seung-Hae</b>
    4261 
    4262 <div class="BibEntry">
    4263 
    4264 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4265 
    4266 <li>
    4267 
    4268 
    4269 <tr>
    4270      <td valign="top">Author</td>
    4271      <td valign="top">Kim, Dongkyun and Kim, Joobum and Wang, Gicheol and Park, Jin-Hyung and Kim, Seung-Hae</td>
    4272 </tr>
    4273 
    4274 <tr>
    4275      <td valign="top">Title</td>
    4276      <td valign="top">K-GENI testbed deployment and federated meta operations experiment over GENI and KREONET</td>
    4277 </tr>
    4278 
    4279 <tr>
    4280      <td valign="top">Journal</td>
    4281      <td valign="top">Computer Networks</td>
    4282 </tr>
    4283 
    4284 <tr>
    4285      <td valign="top">Year</td>
    4286      <td valign="top">2014</td>
    4287 </tr>
    4288 
    4289 <tr>
    4290      <td valign="top">Abstract</td>
    4291      <td valign="top">The classical Internet has confronted many drawbacks in terms of network security, scalability, and performance, although it has strongly influenced the development and evolution of diverse network technologies, applications, and services. Therefore, new innovative research on the Future Internet has been performed to resolve the inherent weaknesses of the traditional Internet, which, in turn, requires new at-scale network testbeds and research infrastructure for large-scale experiments. In this context, K-GENI has been developed as an international programmable Future Internet testbed in the GENI spiral-2 program, and it has been operational between the USA (GENI) and Korea (KREONET) since 2010. The K-GENI testbed and the related collaborative efforts will be introduced with two major topics in this paper: (1) the design and deployment of the K-GENI testbed and (2) the federated meta operations between the K-GENI and GENI testbeds. Regarding the second topic in particular, we will describe how meta operations are federated across K-GENI between GMOC (GENI Meta Operations Center) and DvNOC (Distributed virtual Network Operations Center on KREONET/K-GENI), which is the first trial of an international experiment on the federated network operations over GENI.</td>
    4292 </tr>
    4293 
    4294 
    4295 
    4296 <tr>
    4297      <td valign="top">DOI</td>
    4298      <td valign="top">10.1016/j.bjp.2013.11.016</td>
    4299 </tr>
    4300 
    4301 
    4302 
    4303 <tr>
    4304      <td valign="top">URL</td>
    4305      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.11.016">http://dx.doi.org/10.1016/j.bjp.2013.11.016</a></td>
    4306 </tr>
    4307 
    4308 
    4309 </li>
    4310 
    4311 </table></div><br><br>
    4312 
    4313 
    4314 
    4315 
    4316 <a class="EntryGoto" id="Kim, Hyunjun and Lee, Sungwon"></a>
    4317 <b class="myheading" style="position: relative; left: 5%;">Kim, Hyunjun and Lee, Sungwon</b>
    4318 
    4319 <div class="BibEntry">
    4320 
    4321 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4322 
    4323 <li>
    4324 
    4325 
    4326 <tr>
    4327      <td valign="top">Author</td>
    4328      <td valign="top">Kim, Hyunjun and Lee, Sungwon</td>
    4329 </tr>
    4330 
    4331 <tr>
    4332      <td valign="top">Title</td>
    4333      <td valign="top">FiRST Cloud Aggregate Manager development over FiRST: Future Internet testbed</td>
    4334 </tr>
    4335 
    4336 <tr>
    4337      <td valign="top">Booktitle</td>
    4338      <td valign="top">The International Conference on Information Network 2012</td>
    4339 </tr>
    4340 
    4341 <tr>
    4342      <td valign="top">Location</td>
    4343      <td valign="top">Bali, Indonesia</td>
    4344 </tr>
    4345 
    4346 <tr>
    4347      <td valign="top">Publisher</td>
    4348      <td valign="top">IEEE</td>
    4349 </tr>
    4350 
    4351 <tr>
    4352      <td valign="top">Year</td>
    4353      <td valign="top">2012</td>
    4354 </tr>
    4355 
    4356 <tr>
    4357      <td valign="top">Abstract</td>
    4358      <td valign="top">FiRST (Future Internet Research for Sustainable Test-bed) is the future internet platform development project being performed in Korea. The goal of the project is to create the virtualized and dynamic service creation environments over future internet networks; it is an experimental project to realize future innovative service ideas over real network environments. Among this, cloud computing is the key enabler to control and allocate virtualized network resources (such as CPU, storage, and virtualized network configuration) for the requested services. However, researches on interworking between future internet and cloud computing is in initial phase. In this paper, we propose the FiRST Cloud Aggregate Manager (AM) based on GENI (Global Environment for Network Innovation) AM Application Programming Interface (API) for the federation between future internet test-bed and open source OpenStack cloud computing platform. After that, we propose the zero-client service for mobile cloud management. In order to control the zero-client service, we develop Cloud Mobility Client/Server. And, we validate and verified our FiRST Cloud AM and zero-client service by developing experimental test-bed. Through this test-bed, we confirm that the proposed FiRST Cloud AM and zero-client service efficiently interworks with future internet control plane framework by using GENI Control Framework (GCF) tools.</td>
    4359 </tr>
    4360 
    4361 
    4362 
    4363 <tr>
    4364      <td valign="top">DOI</td>
    4365      <td valign="top">10.1109/ICOIN.2012.6164436</td>
    4366 </tr>
    4367 
    4368 
    4369 
    4370 <tr>
    4371      <td valign="top">URL</td>
    4372      <td valign="top"><a href="http://dx.doi.org/10.1109/ICOIN.2012.6164436">http://dx.doi.org/10.1109/ICOIN.2012.6164436</a></td>
    4373 </tr>
    4374 
    4375 
    4376 </li>
    4377 
    4378 </table></div><br><br>
    4379 
    4380 
    4381 
    4382 
    4383 <a class="EntryGoto" id="Kline, Donald and Quan, John"></a>
    4384 <b class="myheading" style="position: relative; left: 5%;">Kline, Donald and Quan, John</b>
    4385 
    4386 <div class="BibEntry">
    4387 
    4388 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4389 
    4390 <li>
    4391 
    4392 
    4393 <tr>
    4394      <td valign="top">Author</td>
    4395      <td valign="top">Kline, Donald and Quan, John</td>
    4396 </tr>
    4397 
    4398 <tr>
    4399      <td valign="top">Title</td>
    4400      <td valign="top">Attribute description service for large-scale networks</td>
    4401 </tr>
    4402 
    4403 <tr>
    4404      <td valign="top">Booktitle</td>
    4405      <td valign="top">Proceedings of the 2nd international conference on Human centered design</td>
    4406 </tr>
    4407 
    4408 <tr>
    4409      <td valign="top">Location</td>
    4410      <td valign="top">Orlando, FL, USA</td>
    4411 </tr>
    4412 
    4413 <tr>
    4414      <td valign="top">Publisher</td>
    4415      <td valign="top">Springer-Verlag</td>
    4416 </tr>
    4417 
    4418 <tr>
    4419      <td valign="top">Address</td>
    4420      <td valign="top">Berlin, Heidelberg</td>
    4421 </tr>
    4422 
    4423 <tr>
    4424      <td valign="top">Year</td>
    4425      <td valign="top">2011</td>
    4426 </tr>
    4427 
    4428 <tr>
    4429      <td valign="top">Abstract</td>
    4430      <td valign="top">An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time consuming. For example, the National Science Foundation sponsors GENI--an experimental network with a goal to gain enough resources to model the Internet at scale. Currently, GENI contains relatively few contributed resources donated from businesses and academia, and so matching resources to tests is rather simple. However, experimenters plan to conduct network experiments that are very complex and difficult to accurately model by using the vast numbers of resources expected in GENI. When GENI reaches its final state, finding the right resources that fit experimental test criteria out of many thousands of donated resources may be as difficult as conducting the experiment itself. This dilemma underscores the importance of establishing an attribute description service that promotes a standardized language for all interactions between the end users and the large-scale network.</td>
    4431 </tr>
    4432 
    4433 
    4434 
    4435 <tr>
    4436      <td valign="top">DOI</td>
    4437      <td valign="top">10.1007/978-3-642-21753-1&#x005F;58</td>
    4438 </tr>
    4439 
    4440 
    4441 
    4442 <tr>
    4443      <td valign="top">URL</td>
    4444      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2021672.2021735">http://portal.acm.org/citation.cfm?id=2021672.2021735</a></td>
    4445 </tr>
    4446 
    4447 
    4448 </li>
    4449 
    4450 </table></div><br><br>
    4451 
    4452 
    4453 
    4454 
    4455 <a class="EntryGoto" id="Kobayashi, Masayoshi and Seetharaman, Srini and Parulkar, Guru and Appenzeller, Guido and Little, Joseph and van Reijendam, Johan and Weissmann, Paul and McKeown, Nick"></a>
    4456 <b class="myheading" style="position: relative; left: 5%;">Kobayashi, Masayoshi and Seetharaman, Srini and Parulkar, Guru and Appenzeller, Guido and Little, Joseph and van Reijendam, Johan and Weissmann, Paul and McKeown, Nick</b>
    4457 
    4458 <div class="BibEntry">
    4459 
    4460 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4461 
    4462 <li>
    4463 
    4464 
    4465 <tr>
    4466      <td valign="top">Author</td>
    4467      <td valign="top">Kobayashi, Masayoshi and Seetharaman, Srini and Parulkar, Guru and Appenzeller, Guido and Little, Joseph and van Reijendam, Johan and Weissmann, Paul and McKeown, Nick</td>
    4468 </tr>
    4469 
    4470 <tr>
    4471      <td valign="top">Title</td>
    4472      <td valign="top">Maturing of OpenFlow and Software-defined Networking through deployments</td>
    4473 </tr>
    4474 
    4475 <tr>
    4476      <td valign="top">Journal</td>
    4477      <td valign="top">Computer Networks</td>
    4478 </tr>
    4479 
    4480 <tr>
    4481      <td valign="top">Year</td>
    4482      <td valign="top">2014</td>
    4483 </tr>
    4484 
    4485 <tr>
    4486      <td valign="top">Abstract</td>
    4487      <td valign="top">Software-defined Networking (SDN) has emerged as a new paradigm of networking that enables network operators, owners, vendors, and even third parties to innovate and create new capabilities at a faster pace. The SDN paradigm shows potential for all domains of use, including data centers, cellular providers, service providers, enterprises, and homes. Over a three-year period, we deployed SDN technology at our campus and at several other campuses nation-wide with the help of partners. These deployments included the first-ever SDN prototype in a lab for a (small) global deployment. The four-phased deployments and demonstration of new networking capabilities enabled by SDN played an important role in maturing SDN and its ecosystem. We share our experiences and lessons learned that have to do with demonstration of SDN's potential; its influence on successive versions of OpenFlow specification; evolution of SDN architecture; performance of SDN and various components; and growing the ecosystem.</td>
    4488 </tr>
    4489 
    4490 
    4491 
    4492 <tr>
    4493      <td valign="top">DOI</td>
    4494      <td valign="top">10.1016/j.bjp.2013.10.011</td>
    4495 </tr>
    4496 
    4497 
    4498 
    4499 <tr>
    4500      <td valign="top">URL</td>
    4501      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.10.011">http://dx.doi.org/10.1016/j.bjp.2013.10.011</a></td>
    4502 </tr>
    4503 
    4504 
    4505 </li>
    4506 
    4507 </table></div><br><br>
    4508 
    4509 
    4510 
    4511 
    4512 <a class="EntryGoto" id="Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M."></a>
    4513 <b class="myheading" style="position: relative; left: 5%;">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</b>
    4514 
    4515 <div class="BibEntry">
    4516 
    4517 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4518 
    4519 <li>
    4520 
    4521 
    4522 <tr>
    4523      <td valign="top">Author</td>
    4524      <td valign="top">Krishnappa, D. K. and Irwin, D. and Lyons, E. and Zink, M.</td>
    4525 </tr>
    4526 
    4527 <tr>
    4528      <td valign="top">Title</td>
    4529      <td valign="top">CloudCast: Cloud Computing for Short-Term Weather Forecasts</td>
    4530 </tr>
    4531 
    4532 <tr>
    4533      <td valign="top">Journal</td>
    4534      <td valign="top">Computing in Science &#x0026; Engineering</td>
    4535 </tr>
    4536 
    4537 <tr>
    4538      <td valign="top">Publisher</td>
    4539      <td valign="top">IEEE</td>
    4540 </tr>
    4541 
    4542 <tr>
    4543      <td valign="top">Year</td>
    4544      <td valign="top">2013</td>
    4545 </tr>
    4546 
    4547 <tr>
    4548      <td valign="top">Abstract</td>
    4549      <td valign="top">CloudCast provides personalized short-term weather forecasts to clients based on their current location using cloud services, generating accurate forecasts tens of minutes in the future for small areas. Results show that it takes less than two minutes from the start of data sampling to deliver a 15-minute forecast to a client.</td>
    4550 </tr>
    4551 
    4552 
    4553 
    4554 <tr>
    4555      <td valign="top">DOI</td>
    4556      <td valign="top">10.1109/mcse.2013.43</td>
    4557 </tr>
    4558 
    4559 
    4560 
    4561 <tr>
    4562      <td valign="top">URL</td>
    4563      <td valign="top"><a href="http://dx.doi.org/10.1109/mcse.2013.43">http://dx.doi.org/10.1109/mcse.2013.43</a></td>
    4564 </tr>
    4565 
    4566 
    4567 </li>
    4568 
    4569 </table></div><br><br>
    4570 
    4571 
    4572 
    4573 
    4574 <a class="EntryGoto" id="Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael"></a>
    4575 <b class="myheading" style="position: relative; left: 5%;">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    4576 
    4577 <div class="BibEntry">
    4578 
    4579 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4580 
    4581 <li>
    4582 
    4583 
    4584 <tr>
    4585      <td valign="top">Author</td>
    4586      <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
    4587 </tr>
    4588 
    4589 <tr>
    4590      <td valign="top">Title</td>
    4591      <td valign="top">Performance of GENI Cloud Testbeds for Real Time Scientific Application</td>
    4592 </tr>
    4593 
    4594 <tr>
    4595      <td valign="top">Booktitle</td>
    4596      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    4597 </tr>
    4598 
    4599 <tr>
    4600      <td valign="top">Location</td>
    4601      <td valign="top">Los Angeles</td>
    4602 </tr>
    4603 
    4604 <tr>
    4605      <td valign="top">Year</td>
    4606      <td valign="top">2012</td>
    4607 </tr>
    4608 
    4609 <tr>
    4610      <td valign="top">Abstract</td>
    4611      <td valign="top">Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.</td>
    4612 </tr>
    4613 
    4614 
    4615 
    4616 
    4617 
    4618 
    4619 </li>
    4620 
    4621 </table></div><br><br>
    4622 
    4623 
    4624 <div class="BibEntry">
    4625 
    4626 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4627 
    4628 <li>
    4629 
    4630 
    4631 <tr>
    4632      <td valign="top">Author</td>
    4633      <td valign="top">Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</td>
    4634 </tr>
    4635 
    4636 <tr>
    4637      <td valign="top">Title</td>
    4638      <td valign="top">Network capabilities of cloud services for a real time scientific application</td>
    4639 </tr>
    4640 
    4641 <tr>
    4642      <td valign="top">Booktitle</td>
    4643      <td valign="top">37th Annual IEEE Conference on Local Computer Networks</td>
    4644 </tr>
    4645 
    4646 <tr>
    4647      <td valign="top">Location</td>
    4648      <td valign="top">Clearwater Beach, FL, USA</td>
    4649 </tr>
    4650 
    4651 <tr>
    4652      <td valign="top">Publisher</td>
    4653      <td valign="top">IEEE</td>
    4654 </tr>
    4655 
    4656 <tr>
    4657      <td valign="top">Year</td>
    4658      <td valign="top">2012</td>
    4659 </tr>
    4660 
    4661 <tr>
    4662      <td valign="top">Abstract</td>
    4663      <td valign="top">Dedicating high-end servers for executing scientific applications that run intermittently, such as severe weather detection or generalized weather forecasting, wastes resources. While the Infrastructure-as-a-Service (IaaS) model used by today's cloud platforms is well-suited for the bursty computational demands of these applications, it is unclear if the network capabilities of today's cloud platforms are sufficient. In this paper, we analyze the networking capabilities of multiple commercial (Amazon's EC2 and Rackspace) and research (GENICloud and ExoGENI cloud) platforms in the context of a Nowcasting application, a forecasting algorithm for highly accurate, near-term, e.g., 5-20 minutes, weather predictions. The application has both computational and network requirements. While it executes rarely, whenever severe weather approaches, it benefits from an IaaS model; However, since its results are time-critical, enough bandwidth must be available to transmit radar data to cloud platforms before it becomes stale. We conduct network capacity measurements between radar sites and cloud platforms throughout the country. Our results indicate that ExoGENI cloud performs the best for both serial and parallel data transfer with an average throughput of 110.22 Mbps and 17.2 Mbps, respectively. We also found that the cloud services perform better in the distributed data transfer case, where a subset of nodes transmit data in parallel to a cloud instance. Ultimately, we conclude that commercial and research clouds are capable of providing sufficient bandwidth for our real-time Nowcasting application.</td>
    4664 </tr>
    4665 
    4666 
    4667 
    4668 <tr>
    4669      <td valign="top">DOI</td>
    4670      <td valign="top">10.1109/lcn.2012.6423665</td>
    4671 </tr>
    4672 
    4673 
    4674 
    4675 <tr>
    4676      <td valign="top">URL</td>
    4677      <td valign="top"><a href="http://dx.doi.org/10.1109/lcn.2012.6423665">http://dx.doi.org/10.1109/lcn.2012.6423665</a></td>
    4678 </tr>
    4679 
    4680 
    4681 </li>
    4682 
    4683 </table></div><br><br>
    4684 
    4685 
    4686 
    4687 
    4688 <a class="EntryGoto" id="Kuai, Meng and Hong, Xiaoyan and Flores, R. R."></a>
    4689 <b class="myheading" style="position: relative; left: 5%;">Kuai, Meng and Hong, Xiaoyan and Flores, R. R.</b>
    4690 
    4691 <div class="BibEntry">
    4692 
    4693 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4694 
    4695 <li>
    4696 
    4697 
    4698 <tr>
    4699      <td valign="top">Author</td>
    4700      <td valign="top">Kuai, Meng and Hong, Xiaoyan and Flores, R. R.</td>
    4701 </tr>
    4702 
    4703 <tr>
    4704      <td valign="top">Title</td>
    4705      <td valign="top">Evaluating Interest Broadcast in Vehicular Named Data Networking</td>
    4706 </tr>
    4707 
    4708 <tr>
    4709      <td valign="top">Booktitle</td>
    4710      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    4711 </tr>
    4712 
    4713 <tr>
    4714      <td valign="top">Publisher</td>
    4715      <td valign="top">IEEE</td>
    4716 </tr>
    4717 
    4718 <tr>
    4719      <td valign="top">Year</td>
    4720      <td valign="top">2014</td>
    4721 </tr>
    4722 
    4723 <tr>
    4724      <td valign="top">Abstract</td>
    4725      <td valign="top">Vehicular Ad-hoc Networks (VANETs) are expected to provide assistance to various applications, such as accident notification and emergency announcement. Named Data Networking (NDN) has been recognized as a more suitable architecture than TCP/IP for application in VANETs due to its ability to handle high mobility and intermittent connectivity. The Vehicular NDN (V-NDN) has further made special architectural modifications for VANETs. However, V-NDN can be challenged in its extensive use of broadcast in dense network situations. For example, broadcasting of interest packets could lead to more collisions. In this study, we explore the broadcast performance of V-NDN using the ORBIT testbed. Our experimental results show that VNDN suffers an increased loss ratio in dense network scenarios because of Wifi broadcast collision, and it is important to find a suitable range of values to be distributed by the collision avoidance timer before transmission.</td>
    4726 </tr>
    4727 
    4728 
    4729 
    4730 <tr>
    4731      <td valign="top">DOI</td>
    4732      <td valign="top">10.1109/gree.2014.23</td>
    4733 </tr>
    4734 
    4735 
    4736 
    4737 <tr>
    4738      <td valign="top">URL</td>
    4739      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.23">http://dx.doi.org/10.1109/gree.2014.23</a></td>
    4740 </tr>
    4741 
    4742 
    4743 </li>
    4744 
    4745 </table></div><br><br>
    4746 
    4747 
    4748 
    4749 
    4750 <a class="EntryGoto" id="Lara, Adrian and Ramamurthy, Byrav and Nagaraja, Kiran and Krishnamoorthy, Aravind and Raychaudhuri, Dipankar"></a>
    4751 <b class="myheading" style="position: relative; left: 5%;">Lara, Adrian and Ramamurthy, Byrav and Nagaraja, Kiran and Krishnamoorthy, Aravind and Raychaudhuri, Dipankar</b>
    4752 
    4753 <div class="BibEntry">
    4754 
    4755 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4756 
    4757 <li>
    4758 
    4759 
    4760 <tr>
    4761      <td valign="top">Author</td>
    4762      <td valign="top">Lara, Adrian and Ramamurthy, Byrav and Nagaraja, Kiran and Krishnamoorthy, Aravind and Raychaudhuri, Dipankar</td>
    4763 </tr>
    4764 
    4765 <tr>
    4766      <td valign="top">Title</td>
    4767      <td valign="top">Using OpenFlow to provide cut-through switching in MobilityFirst</td>
    4768 </tr>
    4769 
    4770 <tr>
    4771      <td valign="top">Booktitle</td>
    4772      <td valign="top">Photonic Network Communications</td>
    4773 </tr>
    4774 
    4775 <tr>
    4776      <td valign="top">Publisher</td>
    4777      <td valign="top">Springer US</td>
    4778 </tr>
    4779 
    4780 <tr>
    4781      <td valign="top">Year</td>
    4782      <td valign="top">2014</td>
    4783 </tr>
    4784 
    4785 <tr>
    4786      <td valign="top">Abstract</td>
    4787      <td valign="top">Mobile devices are expected to become the Internet's predominant technology. Current protocols such as TCP/IP were not originally designed with mobility as a key consideration, and therefore underperform under challenging mobile and wireless conditions. MobilityFirst, a clean slate architecture proposal, embraces several key concepts centered around secure identifiers that inherently support mobility and trustworthiness as key requirements of the network architecture. This includes a hop-by-hop segmented data transport based on a globally unique identifier. This allows late and dynamic rebinding of end-point addresses to support mobility. While this provides critical gains in wireless segments, some overheads are incurred even in stable segments such as in the core. Bypassing routing-layer decisions in these cases, with lower layer cut-through forwarding, can improve said gains. In this work, we introduce a general bypass capability within the MobilityFirst architecture that provides better performance and enables both individual and aggregate flow-level traffic control. Furthermore, we present an OpenFlow-based proof-of-concept implementation of the bypass function using layer 2 VLAN tagging. We run experiments on the ORBIT and Global Environment for Network Innovations (GENI) testbeds to evaluate the performance and scalability of the solution. By implementing the bypass functionality, we are able to significantly reduce the number of messages processed by the controller as well as the number of flow rules that need to be pushed into the switches.</td>
    4788 </tr>
    4789 
    4790 
    4791 
    4792 <tr>
    4793      <td valign="top">DOI</td>
    4794      <td valign="top">10.1007/s11107-014-0461-3</td>
    4795 </tr>
    4796 
    4797 
    4798 
    4799 <tr>
    4800      <td valign="top">URL</td>
    4801      <td valign="top"><a href="http://dx.doi.org/10.1007/s11107-014-0461-3">http://dx.doi.org/10.1007/s11107-014-0461-3</a></td>
    4802 </tr>
    4803 
    4804 
    4805 </li>
    4806 
    4807 </table></div><br><br>
    4808 
    4809 
    4810 
    4811 
    4812 <a class="EntryGoto" id="Lee, Jae W."></a>
    4813 <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W.</b>
    4814 
    4815 <div class="BibEntry">
    4816 
    4817 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4818 
    4819 <li>
    4820 
    4821 
    4822 <tr>
    4823      <td valign="top">Author</td>
    4824      <td valign="top">Lee, Jae W.</td>
    4825 </tr>
    4826 
    4827 <tr>
    4828      <td valign="top">Title</td>
    4829      <td valign="top">Towards a Common System Architecture for Dynamically Deploying Network Services in Routers and End Hosts</td>
    4830 </tr>
    4831 
    4832 <tr>
    4833      <td valign="top">Year</td>
    4834      <td valign="top">2012</td>
    4835 </tr>
    4836 
    4837 <tr>
    4838      <td valign="top">Abstract</td>
    4839      <td valign="top">The architectural simplicity of the core Internet is a double-edged sword. On the one hand, its agnostic nature paved the way for endless innovations of end-to-end applications. On the other hand, the inherent limitation of this simplicity makes it difficult to add new functions to the network core itself. This is exacerbated by the conservative tendency of commercial entities to &#x6c;&#x0308;eave well-enough alone&#x2c;&#x0308; leading to the current situation often referred to as the ossification of the Internet. For decades, there has been practically no new functionality that has been added to the core Internet on a large scale. This thesis explores the possibility of enabling in-network services towards the goal of overcoming the ossification of the Internet. Our ultimate goal is to provide a common run-time environment supported by all Internet nodes and a wide-area deployment mechanism, so that network services can be freely installed, removed, and migrated among Internet nodes of all kinds–from a backbone router to a set-top box at home. In that vision of a future Internet, there is little difference between servers and routers for the purpose of running network services. Services can run anywhere on the Internet. Application service providers will have the freedom to choose the best place to run their code. This thesis presents NetServ, our first step to realize the vision of network services running anywhere on the Internet. NetServ is a node architecture for dynamically deploying in-network services on edge routers. Network functions and applications are implemented as software modules which can be deployed at any NetServ-enabled node on the Internet, subject to policy restrictions. The NetServ framework provides a common execution environment for service modules and the ability to dynamically install and remove the services without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Inter- net, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple without restarting the nodes. There are many challenges in designing such a system. The main contribution of this thesis lies in meeting those challenges. First, we recognize that the primary impetus for adopting new technologies is economics. To address the challenge of providing economic incentives for enabling in-network services, we demonstrate how NetServ can facilitate an economic alliance between content providers and ISPs. Using NetServ, content providers and the ISPs operating at the network edge (aka eyeball ISPs) can enter into a mutually beneficial economic relationship. ISPs make their NetServ-enabled edge routers available for hosting content providers' applications and contents. Content providers can operate closer to end users by deploying code modules on NetServ-enabled edge routers. We make our case by presenting NetServ applications which represent four concrete use cases. Second, our node architecture must support both traditional server applications and in-network packet processing applications since content providers' applications running on ISPs' routers will combine the traits of both. To address this challenge, NetServ framework can host a packet processing module that sits in the data path, a server module that uses the TCP/IP stack in the traditional way, or a combined module that does both. NetServ provides a unified runtime environment between routers and servers, taking us a step closer to the vision of the unified runtime available on all Internet nodes. Third, we must provide a fast and streamlined deployment mechanism. Content providers should be able to deploy their applications at any NetServ-enabled edge router on the Internet, given that they have proper authorizations. Moreover, in some application scenarios, content providers may not know the exact locations of the target routers. Content providers need a way to send a message to install or remove an application module towards a network destination, and have the NetServ-enabled routers located in the path catch and act on the message. To address this challenge, we adopted on-path signaling as the deployment mechanism for NetServ. A NetServ signaling message is sent in an IP packet towards a destination. The packet gets forwarded by IP routers as usual, but when it transits a NetServ-enabled router, the message gets intercepted and passed to the NetServ control layer. Fourth, a NetServ-enabled router must support the concurrent executions of multiple content providers' applications. Each content provider's execution environment must be isolated from one another, and the resource usage of each must be controlled. To address the challenge of providing a robust multi-user execution environment, we chose to run NetServ modules in user space. This is in stark contrast to most programmable routers, which run service modules in kernel space for fast packet processing. Furthermore, NetServ modules are written in Java and run in Java Virtual Machines (JVMs). Our choice of user space execution and JVM allows us to leverage the decades of technology advances in operating systems, virtualization, and Java. Lastly, in order to host the services of a large number of content providers, NetServ must be able to scale beyond the single-box architecture. We address this challenge with the multi-box lateral expansion of NetServ using the OpenFlow forwarding engine. In this extended architecture, multiple NetServ nodes are attached to an OpenFlow switch, which provides a physically separate forwarding plane. The scalability of user services is no longer limited to a single NetServ box. Additionally, this thesis presents our prior work on improving service discovery in local and global networks. The service discovery work makes indirect contribution because the limitations of local and overlay networks encountered during those studies eventually led us to investigate in-network services, which resulted in NetServ. Specifically, we investigate the issues involved in bootstrapping large-scale structured overlay networks, present a tool to merge service announcements from multiple local networks, and propose an enhancement to structured overlay networks using link-local multicast.</td>
    4840 </tr>
    4841 
    4842 
    4843 
    4844 
    4845 
    4846 <tr>
    4847      <td valign="top">URL</td>
    4848      <td valign="top"><a href="http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf">http://academiccommons.columbia.edu/download/fedora&#x005F;content/download/ac:147210/CONTENT/Lee&#x005F;columbia&#x005F;0054D&#x005F;10773.pdf</a></td>
    4849 </tr>
    4850 
    4851 
    4852 </li>
    4853 
    4854 </table></div><br><br>
    4855 
    4856 
    4857 
    4858 
    4859 <a class="EntryGoto" id="Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang"></a>
    4860 <b class="myheading" style="position: relative; left: 5%;">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</b>
    4861 
    4862 <div class="BibEntry">
    4863 
    4864 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4865 
    4866 <li>
    4867 
    4868 
    4869 <tr>
    4870      <td valign="top">Author</td>
    4871      <td valign="top">Lee, Jae W. and Francescangeli, Roberto and Janak, Jan and Srinivasan, Suman and Baset, Salman A. and Schulzrinne, Henning and Despotovic, Zoran and Kellerer, Wolfgang</td>
    4872 </tr>
    4873 
    4874 <tr>
    4875      <td valign="top">Title</td>
    4876      <td valign="top">NetServ: Active Networking 2.0</td>
    4877 </tr>
    4878 
    4879 <tr>
    4880      <td valign="top">Booktitle</td>
    4881      <td valign="top">2011 IEEE International Conference on Communications Workshops (ICC)</td>
    4882 </tr>
    4883 
    4884 <tr>
    4885      <td valign="top">Location</td>
    4886      <td valign="top">Kyoto, Japan</td>
    4887 </tr>
    4888 
    4889 <tr>
    4890      <td valign="top">Publisher</td>
    4891      <td valign="top">IEEE</td>
    4892 </tr>
    4893 
    4894 <tr>
    4895      <td valign="top">Year</td>
    4896      <td valign="top">2011</td>
    4897 </tr>
    4898 
    4899 <tr>
    4900      <td valign="top">Abstract</td>
    4901      <td valign="top">We present NetServ, a node architecture for deploying in-network services in the next generation Internet. NetServ-enabled network nodes provide a common execution environment, where network services implemented as modules can be dynamically installed and removed. We demonstrate three such modules. MicroCDN is a dynamic content distribution network (CDN) service which implements a content caching strategy specific to a content provider. The NAT Keep-alive module offloads the processing of keep-alive messages from SIP servers. The Media Relay module allows any NetServ node to act as a media relay, eliminating the need to manage standalone relay servers. NetServ aims to revive the Active Networking vision. It was too far ahead of its time a decade ago, but we believe its time has finally arrived.</td>
    4902 </tr>
    4903 
    4904 
    4905 
    4906 <tr>
    4907      <td valign="top">DOI</td>
    4908      <td valign="top">10.1109/iccw.2011.5963554</td>
    4909 </tr>
    4910 
    4911 
    4912 
    4913 <tr>
    4914      <td valign="top">URL</td>
    4915      <td valign="top"><a href="http://dx.doi.org/10.1109/iccw.2011.5963554">http://dx.doi.org/10.1109/iccw.2011.5963554</a></td>
    4916 </tr>
    4917 
    4918 
    4919 </li>
    4920 
    4921 </table></div><br><br>
    4922 
    4923 
    4924 
    4925 
    4926 <a class="EntryGoto" id="Lee, Ki S. and Wang, Han and Weatherspoon, Hakim"></a>
    4927 <b class="myheading" style="position: relative; left: 5%;">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</b>
    4928 
    4929 <div class="BibEntry">
    4930 
    4931 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4932 
    4933 <li>
    4934 
    4935 
    4936 <tr>
    4937      <td valign="top">Author</td>
    4938      <td valign="top">Lee, Ki S. and Wang, Han and Weatherspoon, Hakim</td>
    4939 </tr>
    4940 
    4941 <tr>
    4942      <td valign="top">Title</td>
    4943      <td valign="top">SoNIC: precise realtime software access and control of wired networks</td>
    4944 </tr>
    4945 
    4946 <tr>
    4947      <td valign="top">Booktitle</td>
    4948      <td valign="top">Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation</td>
    4949 </tr>
    4950 
    4951 <tr>
    4952      <td valign="top">Location</td>
    4953      <td valign="top">Lombard, IL</td>
    4954 </tr>
    4955 
    4956 <tr>
    4957      <td valign="top">Publisher</td>
    4958      <td valign="top">USENIX Association</td>
    4959 </tr>
    4960 
    4961 <tr>
    4962      <td valign="top">Address</td>
    4963      <td valign="top">Berkeley, CA, USA</td>
    4964 </tr>
    4965 
    4966 <tr>
    4967      <td valign="top">Year</td>
    4968      <td valign="top">2013</td>
    4969 </tr>
    4970 
    4971 
    4972 
    4973 
    4974 
    4975 <tr>
    4976      <td valign="top">URL</td>
    4977      <td valign="top"><a href="http://dl.acm.org/citation.cfm?id=2482626.2482648">http://dl.acm.org/citation.cfm?id=2482626.2482648</a></td>
    4978 </tr>
    4979 
    4980 
    4981 </li>
    4982 
    4983 </table></div><br><br>
    4984 
    4985 
    4986 
    4987 
    4988 <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan"></a>
    4989 <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan</b>
    4990 
    4991 <div class="BibEntry">
    4992 
    4993 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    4994 
    4995 <li>
    4996 
    4997 
    4998 <tr>
    4999      <td valign="top">Author</td>
    5000      <td valign="top">Li, Dawei and Hong, Xiaoyan</td>
    5001 </tr>
    5002 
    5003 <tr>
    5004      <td valign="top">Title</td>
    5005      <td valign="top">Practical exploitation on system vulnerability of ProtoGENI</td>
    5006 </tr>
    5007 
    5008 <tr>
    5009      <td valign="top">Booktitle</td>
    5010      <td valign="top">Proceedings of the 49th Annual Southeast Regional Conference</td>
    5011 </tr>
    5012 
    5013 <tr>
    5014      <td valign="top">Location</td>
    5015      <td valign="top">Kennesaw, Georgia</td>
    5016 </tr>
    5017 
    5018 <tr>
    5019      <td valign="top">Publisher</td>
    5020      <td valign="top">ACM</td>
    5021 </tr>
    5022 
    5023 <tr>
    5024      <td valign="top">Address</td>
    5025      <td valign="top">New York, NY, USA</td>
    5026 </tr>
    5027 
    5028 <tr>
    5029      <td valign="top">Year</td>
    5030      <td valign="top">2011</td>
    5031 </tr>
    5032 
    5033 <tr>
    5034      <td valign="top">Abstract</td>
    5035      <td valign="top">Global Environment for Network Innovations (GENI) is a unique virtual laboratory for at-scale networking experimentation exploring future Internets. The successful development of GENI has to consider security problems from the design and prototyping stages. However, in many cases, system vulnerability cannot be found unless through real experimentation bearing purposeful and meaningful designs. In this paper, we introduce some of our efforts in exploring the security vulnerabilities in ProtoGENI, a prototype implementation and deployment of GENI. Our results show potential breach on security of GENI in terms of availability. We make suggestions on potential defense strategies in order to improve the ProtoGENI security and its development.</td>
    5036 </tr>
    5037 
    5038 
    5039 
    5040 <tr>
    5041      <td valign="top">DOI</td>
    5042      <td valign="top">10.1145/2016039.2016073</td>
    5043 </tr>
    5044 
    5045 
    5046 
    5047 <tr>
    5048      <td valign="top">URL</td>
    5049      <td valign="top"><a href="http://dx.doi.org/10.1145/2016039.2016073">http://dx.doi.org/10.1145/2016039.2016073</a></td>
    5050 </tr>
    5051 
    5052 
    5053 </li>
    5054 
    5055 </table></div><br><br>
    5056 
    5057 
    5058 
    5059 
    5060 <a class="EntryGoto" id="Li, Dawei and Hong, Xiaoyan and Bowman, Jason"></a>
    5061 <b class="myheading" style="position: relative; left: 5%;">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</b>
    5062 
    5063 <div class="BibEntry">
    5064 
    5065 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5066 
    5067 <li>
    5068 
    5069 
    5070 <tr>
    5071      <td valign="top">Author</td>
    5072      <td valign="top">Li, Dawei and Hong, Xiaoyan and Bowman, Jason</td>
    5073 </tr>
    5074 
    5075 <tr>
    5076      <td valign="top">Title</td>
    5077      <td valign="top">Evaluation of Security Vulnerabilities by Using ProtoGENI as a Launchpad</td>
    5078 </tr>
    5079 
    5080 <tr>
    5081      <td valign="top">Booktitle</td>
    5082      <td valign="top">IEEE Global Communications Conference (GLOBECOM 2011)</td>
    5083 </tr>
    5084 
    5085 <tr>
    5086      <td valign="top">Year</td>
    5087      <td valign="top">2011</td>
    5088 </tr>
    5089 
    5090 <tr>
    5091      <td valign="top">Abstract</td>
    5092      <td valign="top">In this paper we analyze the security architecture of ProtoGENI. ProtoGENI is a prototype control framework implementation of GENI (Global Environment for Network Innovations). We perform a variety of experiments in an effort to identify potential vulnerabilities presented in the current implementation. We classify our attacks into three types: data plane to data plane, data plane to control plane, and data plane to Internet. Our results indicate the potential for a breach of confidentiality and availability internally within ProtoGENI, as well as risks to external Internet. We make suggestions outlining possible defense strategies to improve ProtoGENI security and aid in future development</td>
    5093 </tr>
    5094 
    5095 
    5096 
    5097 
    5098 
    5099 <tr>
    5100      <td valign="top">URL</td>
    5101      <td valign="top"><a href="ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF">ftp://202.38.75.7/pub/&#x0025;D0&#x0025;C2&#x0025;CE&#x0025;C4&#x0025;BC&#x0025;FE&#x0025;BC&#x0025;D0&#x0025;20(2)/DATA/PID1102190.PDF</a></td>
    5102 </tr>
    5103 
    5104 
    5105 </li>
    5106 
    5107 </table></div><br><br>
    5108 
    5109 
    5110 
    5111 
    5112 <a class="EntryGoto" id="Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason"></a>
    5113 <b class="myheading" style="position: relative; left: 5%;">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</b>
    5114 
    5115 <div class="BibEntry">
    5116 
    5117 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5118 
    5119 <li>
    5120 
    5121 
    5122 <tr>
    5123      <td valign="top">Author</td>
    5124      <td valign="top">Li, Ting and Van Vorst, Nathanael and Rong, Rong and Liu, Jason</td>
    5125 </tr>
    5126 
    5127 <tr>
    5128      <td valign="top">Title</td>
    5129      <td valign="top">Simulation studies of OpenFlow-based in-network caching strategies</td>
    5130 </tr>
    5131 
    5132 <tr>
    5133      <td valign="top">Booktitle</td>
    5134      <td valign="top">Proceedings of the 15th Communications and Networking Simulation Symposium</td>
    5135 </tr>
    5136 
    5137 <tr>
    5138      <td valign="top">Location</td>
    5139      <td valign="top">Orlando, Florida</td>
    5140 </tr>
    5141 
    5142 <tr>
    5143      <td valign="top">Publisher</td>
    5144      <td valign="top">Society for Computer Simulation International</td>
    5145 </tr>
    5146 
    5147 <tr>
    5148      <td valign="top">Address</td>
    5149      <td valign="top">San Diego, CA, USA</td>
    5150 </tr>
    5151 
    5152 <tr>
    5153      <td valign="top">Year</td>
    5154      <td valign="top">2012</td>
    5155 </tr>
    5156 
    5157 <tr>
    5158      <td valign="top">Abstract</td>
    5159      <td valign="top">We propose an in-network caching architecture using Open-Flow to coordinate caching decisions in the network. Our scheme, called CacheFlow, extends the cache-and-forward concept by moving contents closer to the clients hop-by-hop using TCP for sending requests and retrieving contents. As such, CacheFlow can be incrementally implemented and deployed in the real network. In this paper, we present a simulation study of several caching policies, including a random cache policy, a statically optimal cache placement policy and a new disk placement strategy that places popular contents at the &#x63;&#x0308;enter&#x20;&#x0308;of the network. Experimental results show that simple in-network caching policies can be realized using today's technology to improve network performance.</td>
    5160 </tr>
    5161 
    5162 
    5163 
    5164 
    5165 
    5166 <tr>
    5167      <td valign="top">URL</td>
    5168      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=2331762.2331774">http://portal.acm.org/citation.cfm?id=2331762.2331774</a></td>
    5169 </tr>
    5170 
    5171 
    5172 </li>
    5173 
    5174 </table></div><br><br>
    5175 
    5176 
    5177 
    5178 
    5179 <a class="EntryGoto" id="Liu, J. and Abu Obaida, M. and Dos Santos, F."></a>
    5180 <b class="myheading" style="position: relative; left: 5%;">Liu, J. and Abu Obaida, M. and Dos Santos, F.</b>
    5181 
    5182 <div class="BibEntry">
    5183 
    5184 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5185 
    5186 <li>
    5187 
    5188 
    5189 <tr>
    5190      <td valign="top">Author</td>
    5191      <td valign="top">Liu, J. and Abu Obaida, M. and Dos Santos, F.</td>
    5192 </tr>
    5193 
    5194 <tr>
    5195      <td valign="top">Title</td>
    5196      <td valign="top">Toward PrimoGENI Constellation for Distributed At-Scale Hybrid Network Test</td>
    5197 </tr>
    5198 
    5199 <tr>
    5200      <td valign="top">Booktitle</td>
    5201      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    5202 </tr>
    5203 
    5204 <tr>
    5205      <td valign="top">Publisher</td>
    5206      <td valign="top">IEEE</td>
    5207 </tr>
    5208 
    5209 <tr>
    5210      <td valign="top">Year</td>
    5211      <td valign="top">2014</td>
    5212 </tr>
    5213 
    5214 <tr>
    5215      <td valign="top">Abstract</td>
    5216      <td valign="top">PrimoGENI provides a GENI aggregate interface through which experimenters can launch large-scale network experiments on GENI resources consisting of both simulated network and real instances of network applications directly running on either virtual or physical machines. Real network traffic generated by the network applications can be introduced into the simulated network in real time and be subjected to proper delays and losses according to the simulated network conditions. To leverage the previous PrimoGENI prototype activities, PrimoGENI Constellation is a newly launched project, which will focus specifically on facilitating distributed at-scale hybrid experiments for real-world high-impact applications. In this paper, we provide an overview of the major achievements of PrimoGENI, and more importantly, discuss the ongoing efforts in PrimoGENI Constellation aiming to achieve the full potential of the hybrid network experiment approach. The main thrusts of PrimoGENI Constellation include: 1) supporting at-scale network experiments potentially distributed on different types of GENI resources in accordance with the GENI experiment workflow, 2) focusing on target applications supporting prominent and high-impact future Internet research, and 3) building the user community through extensive education and research training, and online archives of experiment results and user experiences.</td>
    5217 </tr>
    5218 
    5219 
    5220 
    5221 <tr>
    5222      <td valign="top">DOI</td>
    5223      <td valign="top">10.1109/gree.2014.10</td>
    5224 </tr>
    5225 
    5226 
    5227 
    5228 <tr>
    5229      <td valign="top">URL</td>
    5230      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.10">http://dx.doi.org/10.1109/gree.2014.10</a></td>
    5231 </tr>
    5232 
    5233 
    5234 </li>
    5235 
    5236 </table></div><br><br>
    5237 
    5238 
    5239 
    5240 
    5241 <a class="EntryGoto" id="Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross"></a>
    5242 <b class="myheading" style="position: relative; left: 5%;">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</b>
    5243 
    5244 <div class="BibEntry">
    5245 
    5246 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5247 
    5248 <li>
    5249 
    5250 
    5251 <tr>
    5252      <td valign="top">Author</td>
    5253      <td valign="top">Liu, Jun and O'Neil, Thomas and Desell, Travis and Carlson, Ross</td>
    5254 </tr>
    5255 
    5256 <tr>
    5257      <td valign="top">Title</td>
    5258      <td valign="top">Work-in-Progress: Empirical Verification of A Subset Sum Hypothesis in GENI Cloud</td>
    5259 </tr>
    5260 
    5261 <tr>
    5262      <td valign="top">Booktitle</td>
    5263      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5264 </tr>
    5265 
    5266 <tr>
    5267      <td valign="top">Location</td>
    5268      <td valign="top">Los Angeles</td>
    5269 </tr>
    5270 
    5271 <tr>
    5272      <td valign="top">Year</td>
    5273      <td valign="top">2012</td>
    5274 </tr>
    5275 
    5276 
    5277 
    5278 
    5279 
    5280 
    5281 </li>
    5282 
    5283 </table></div><br><br>
    5284 
    5285 
    5286 
    5287 
    5288 <a class="EntryGoto" id="Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi"></a>
    5289 <b class="myheading" style="position: relative; left: 5%;">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</b>
    5290 
    5291 <div class="BibEntry">
    5292 
    5293 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5294 
    5295 <li>
    5296 
    5297 
    5298 <tr>
    5299      <td valign="top">Author</td>
    5300      <td valign="top">Luna, Nicholas and Shetty, Sachin and Rogers, Tamara and Xiong, Kaiqi</td>
    5301 </tr>
    5302 
    5303 <tr>
    5304      <td valign="top">Title</td>
    5305      <td valign="top">Assessment of Router Vulnerabilities on PlanetLab Infrastructure for Secure Cloud Computing</td>
    5306 </tr>
    5307 
    5308 <tr>
    5309      <td valign="top">Booktitle</td>
    5310      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5311 </tr>
    5312 
    5313 <tr>
    5314      <td valign="top">Location</td>
    5315      <td valign="top">Los Angeles</td>
    5316 </tr>
    5317 
    5318 <tr>
    5319      <td valign="top">Year</td>
    5320      <td valign="top">2012</td>
    5321 </tr>
    5322 
    5323 <tr>
    5324      <td valign="top">Abstract</td>
    5325      <td valign="top">In recent times, the cloud computing based delivery model has been proven to reduce enterprise IT costs and complexities. In contrast to traditional enterprise IT solutions, the cloud computing model moves the application software and data to remote servers in large datacenters, which raises many security challenges. One of the critical challenges is the inability to characterize the impact of the vulnerabilities of routers on the cloud security and performance guarantees. In this paper, we analyze the degree of security provided by routers to data sharing applications deployed in cloud environments that span administrative and network domains. Our analysis is based on examining the security level of network applications on routers which lie between nodes on Planetlab infrastructure. We assume that some of the PlanetLab nodes will share the same wide area network path as the cloud servers. Our preliminary results confirm that the majority of the routers are plagued by insecure network protocols, leading to vulnerable routers. These results confirm our hypothesis that the security of the network infrastructure needs to be upgraded to assure the protection of information exchanged on the wide area network path.</td>
    5326 </tr>
    5327 
    5328 
    5329 
    5330 
    5331 
    5332 
    5333 </li>
    5334 
    5335 </table></div><br><br>
    5336 
    5337 
    5338 
    5339 
    5340 <a class="EntryGoto" id="Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H."></a>
    5341 <b class="myheading" style="position: relative; left: 5%;">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</b>
    5342 
    5343 <div class="BibEntry">
    5344 
    5345 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5346 
    5347 <li>
    5348 
    5349 
    5350 <tr>
    5351      <td valign="top">Author</td>
    5352      <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
    5353 </tr>
    5354 
    5355 <tr>
    5356      <td valign="top">Title</td>
    5357      <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
    5358 </tr>
    5359 
    5360 <tr>
    5361      <td valign="top">Booktitle</td>
    5362      <td valign="top">2012 IEEE Network Operations and Management Symposium</td>
    5363 </tr>
    5364 
    5365 <tr>
    5366      <td valign="top">Location</td>
    5367      <td valign="top">Maui, HI</td>
    5368 </tr>
    5369 
    5370 <tr>
    5371      <td valign="top">Publisher</td>
    5372      <td valign="top">IEEE</td>
    5373 </tr>
    5374 
    5375 <tr>
    5376      <td valign="top">Year</td>
    5377      <td valign="top">2012</td>
    5378 </tr>
    5379 
    5380 <tr>
    5381      <td valign="top">Abstract</td>
    5382      <td valign="top">Autonomic management capabilities of the Future Internet can be provided through a recently proposed service architecture called NetServ. It consists of the interconnection of programmable nodes which enable dynamic deployment and execution of network and application services. This paper shows how this architecture can be further improved by introducing the OpenFlow architecture and implementing the OpenFlow controller as a NetServ service, thus improving both the NetServ management performance and its flexibility. These achievements are demonstrated experimentally on the GENI environment, showing the platform self-protecting capabilities in case of a SIP DoS attack.</td>
    5383 </tr>
    5384 
    5385 
    5386 
    5387 <tr>
    5388      <td valign="top">DOI</td>
    5389      <td valign="top">10.1109/NOMS.2012.6211961</td>
    5390 </tr>
    5391 
    5392 
    5393 
    5394 <tr>
    5395      <td valign="top">URL</td>
    5396      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
    5397 </tr>
    5398 
    5399 
    5400 </li>
    5401 
    5402 </table></div><br><br>
    5403 
    5404 
    5405 <div class="BibEntry">
    5406 
    5407 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5408 
    5409 <li>
    5410 
    5411 
    5412 <tr>
    5413      <td valign="top">Author</td>
    5414      <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td>
    5415 </tr>
    5416 
    5417 <tr>
    5418      <td valign="top">Title</td>
    5419      <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td>
    5420 </tr>
    5421 
    5422 <tr>
    5423      <td valign="top">Booktitle</td>
    5424      <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td>
    5425 </tr>
    5426 
    5427 <tr>
    5428      <td valign="top">Year</td>
    5429      <td valign="top">2012</td>
    5430 </tr>
    5431 
    5432 
    5433 
    5434 <tr>
    5435      <td valign="top">DOI</td>
    5436      <td valign="top">10.1109/NOMS.2012.6211961</td>
    5437 </tr>
    5438 
    5439 
    5440 
    5441 <tr>
    5442      <td valign="top">URL</td>
    5443      <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td>
    5444 </tr>
    5445 
    5446 
    5447 </li>
    5448 
    5449 </table></div><br><br>
    5450 
    5451 
    5452 
    5453 
    5454 <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y."></a>
    5455 <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</b>
    5456 
    5457 <div class="BibEntry">
    5458 
    5459 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5460 
    5461 <li>
    5462 
    5463 
    5464 <tr>
    5465      <td valign="top">Author</td>
    5466      <td valign="top">Mahindra, R. and Bhanage, G. D. and Hadjichristofi, G. and Seskar, I. and Raychaudhuri, D. and Zhang, Y. Y.</td>
    5467 </tr>
    5468 
    5469 <tr>
    5470      <td valign="top">Title</td>
    5471      <td valign="top">Space Versus Time Separation for Wireless Virtualization on an Indoor Grid</td>
    5472 </tr>
    5473 
    5474 <tr>
    5475      <td valign="top">Booktitle</td>
    5476      <td valign="top">Next Generation Internet Networks, 2008. NGI 2008</td>
    5477 </tr>
    5478 
    5479 <tr>
    5480      <td valign="top">Publisher</td>
    5481      <td valign="top">IEEE</td>
    5482 </tr>
    5483 
    5484 <tr>
    5485      <td valign="top">Year</td>
    5486      <td valign="top">2008</td>
    5487 </tr>
    5488 
    5489 <tr>
    5490      <td valign="top">Abstract</td>
    5491      <td valign="top">The decreasing cost of wireless hardware and ever increasing number of wireless testbeds has led to a shift in the protocol evaluation paradigm from simulations towards emulation. In addition, with a large number of users demanding experimental resources and lack of space and time for deploying more hardware, fair resource sharing among independent co-existing experiments is important. We study the proposed approaches to wireless virtualization with a focus on schemes conserving wireless channels rather than nodes. Our detailed comparison reveals that while experiments sharing a channel by space separation achieve better efficiency than those relying on time separation of a channel, the isolation between experiments in both cases is comparable. We propose and implement a policy manager to alleviate the isolation problem and suggest scenarios in which either of the schemes would provide a suitable virtualization solution.</td>
    5492 </tr>
    5493 
    5494 
    5495 
    5496 <tr>
    5497      <td valign="top">DOI</td>
    5498      <td valign="top">10.1109/NGI.2008.36</td>
    5499 </tr>
    5500 
    5501 
    5502 
    5503 <tr>
    5504      <td valign="top">URL</td>
    5505      <td valign="top"><a href="http://dx.doi.org/10.1109/NGI.2008.36">http://dx.doi.org/10.1109/NGI.2008.36</a></td>
    5506 </tr>
    5507 
    5508 
    5509 </li>
    5510 
    5511 </table></div><br><br>
    5512 
    5513 
    5514 
    5515 
    5516 <a class="EntryGoto" id="Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D."></a>
    5517 <b class="myheading" style="position: relative; left: 5%;">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</b>
    5518 
    5519 <div class="BibEntry">
    5520 
    5521 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5522 
    5523 <li>
    5524 
    5525 
    5526 <tr>
    5527      <td valign="top">Author</td>
    5528      <td valign="top">Mahindra, R. and Bhanage, G. and Hadjichristofi, G. and Ganu, S. and Kamat, P. and Seskar, I. and Raychaudhuri, D.</td>
    5529 </tr>
    5530 
    5531 <tr>
    5532      <td valign="top">Title</td>
    5533      <td valign="top">Integration of heterogeneous networking testbeds</td>
    5534 </tr>
    5535 
    5536 <tr>
    5537      <td valign="top">Booktitle</td>
    5538      <td valign="top">Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks &#x0026; communities</td>
    5539 </tr>
    5540 
    5541 <tr>
    5542      <td valign="top">Location</td>
    5543      <td valign="top">Innsbruck, Austria</td>
    5544 </tr>
    5545 
    5546 <tr>
    5547      <td valign="top">Publisher</td>
    5548      <td valign="top">ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)</td>
    5549 </tr>
    5550 
    5551 <tr>
    5552      <td valign="top">Address</td>
    5553      <td valign="top">ICST, Brussels, Belgium, Belgium</td>
    5554 </tr>
    5555 
    5556 <tr>
    5557      <td valign="top">Year</td>
    5558      <td valign="top">2008</td>
    5559 </tr>
    5560 
    5561 <tr>
    5562      <td valign="top">Abstract</td>
    5563      <td valign="top">As networking research expands into new frontiers, the research community has felt a need for a heterogeneous networking research infrastructure to experiment with the interaction and integration of different types of networks, and to test the performance of various networking protocols in realistic environments. This requirement has led to the Global Environment for Network Innovations (GENI) initiative to create a global infrastructure for conducting networking experiments across diverse substrates such as wired (local and wide-area), wireless, sensor and cellular networks. In this paper, we discuss and present two models for building such an experimental infrastructure. The first model enables a wired testbed to link with wireless edge nodes during an experiment, whereas the second model enables a wireless testbed to link to wired testbeds. Proof-of-concept experiments are also presented reinforcing the usefulness of the models in terms of facilitating experiments over the integrated heterogeneous infrastructure.</td>
    5564 </tr>
    5565 
    5566 
    5567 
    5568 
    5569 
    5570 <tr>
    5571      <td valign="top">URL</td>
    5572      <td valign="top"><a href="http://portal.acm.org/citation.cfm?id=1390609">http://portal.acm.org/citation.cfm?id=1390609</a></td>
    5573 </tr>
    5574 
    5575 
    5576 </li>
    5577 
    5578 </table></div><br><br>
    5579 
    5580 
    5581 
    5582 
    5583 <a class="EntryGoto" id="Malishevskiy, A. and Gurkan, D. and Dane, L. and Narisetty, R. and Narayan, S. and Bailey, S."></a>
    5584 <b class="myheading" style="position: relative; left: 5%;">Malishevskiy, A. and Gurkan, D. and Dane, L. and Narisetty, R. and Narayan, S. and Bailey, S.</b>
    5585 
    5586 <div class="BibEntry">
    5587 
    5588 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5589 
    5590 <li>
    5591 
    5592 
    5593 <tr>
    5594      <td valign="top">Author</td>
    5595      <td valign="top">Malishevskiy, A. and Gurkan, D. and Dane, L. and Narisetty, R. and Narayan, S. and Bailey, S.</td>
    5596 </tr>
    5597 
    5598 <tr>
    5599      <td valign="top">Title</td>
    5600      <td valign="top">OpenFlow-Based Network Management with Visualization of Managed Elements</td>
    5601 </tr>
    5602 
    5603 <tr>
    5604      <td valign="top">Booktitle</td>
    5605      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    5606 </tr>
    5607 
    5608 <tr>
    5609      <td valign="top">Publisher</td>
    5610      <td valign="top">IEEE</td>
    5611 </tr>
    5612 
    5613 <tr>
    5614      <td valign="top">Year</td>
    5615      <td valign="top">2014</td>
    5616 </tr>
    5617 
    5618 <tr>
    5619      <td valign="top">Abstract</td>
    5620      <td valign="top">The new software defined networking (SDN) paradigm advocates separating the data plane and the control plane, making network switches simple packet forwarding devices and leaving a logically-centralized software to control the behavior of the network. SDN introduces new possibilities for a centralized network management and configuration. The main benefit is having the programmability of the forwarding tables according to the needs of the applications. Therefore, efficient and effective management of network resources becomes even more crucial in providing effective control plane functionality to the applications. OpenFlow standardization efforts at the Open Networking Foundation resulted in an OpenFlow Configuration (OFConfig) specification to address the management of resources in networks with OpenFlow-enabled switches. We report the implementation of an intuitively easy to use interface for the OpenFlow-capable logical devices as managed resources in a SDN.</td>
    5621 </tr>
    5622 
    5623 
    5624 
    5625 <tr>
    5626      <td valign="top">DOI</td>
    5627      <td valign="top">10.1109/gree.2014.21</td>
    5628 </tr>
    5629 
    5630 
    5631 
    5632 <tr>
    5633      <td valign="top">URL</td>
    5634      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.21">http://dx.doi.org/10.1109/gree.2014.21</a></td>
    5635 </tr>
    5636 
    5637 
    5638 </li>
    5639 
    5640 </table></div><br><br>
    5641 
    5642 
    5643 
    5644 
    5645 <a class="EntryGoto" id="Mambretti, Joe and Chen, Jim and Yeh, Fei"></a>
    5646 <b class="myheading" style="position: relative; left: 5%;">Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    5647 
    5648 <div class="BibEntry">
    5649 
    5650 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5651 
    5652 <li>
    5653 
    5654 
    5655 <tr>
    5656      <td valign="top">Author</td>
    5657      <td valign="top">Mambretti, Joe and Chen, Jim and Yeh, Fei</td>
    5658 </tr>
    5659 
    5660 <tr>
    5661      <td valign="top">Title</td>
    5662      <td valign="top">Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies</td>
    5663 </tr>
    5664 
    5665 <tr>
    5666      <td valign="top">Booktitle</td>
    5667      <td valign="top">Teletraffic Congress (ITC), 2014 26th International</td>
    5668 </tr>
    5669 
    5670 <tr>
    5671      <td valign="top">Publisher</td>
    5672      <td valign="top">IEEE</td>
    5673 </tr>
    5674 
    5675 <tr>
    5676      <td valign="top">Year</td>
    5677      <td valign="top">2014</td>
    5678 </tr>
    5679 
    5680 <tr>
    5681      <td valign="top">Abstract</td>
    5682      <td valign="top">Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs.</td>
    5683 </tr>
    5684 
    5685 
    5686 
    5687 <tr>
    5688      <td valign="top">DOI</td>
    5689      <td valign="top">10.1109/itc.2014.6932970</td>
    5690 </tr>
    5691 
    5692 
    5693 
    5694 <tr>
    5695      <td valign="top">URL</td>
    5696      <td valign="top"><a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a></td>
    5697 </tr>
    5698 
    5699 
    5700 </li>
    5701 
    5702 </table></div><br><br>
    5703 
    5704 
    5705 <div class="BibEntry">
    5706 
    5707 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5708 
    5709 <li>
    5710 
    5711 
    5712 <tr>
    5713      <td valign="top">Author</td>
    5714      <td valign="top">Mambretti, Joe and Chen, Jim and Yeh, Fei</td>
    5715 </tr>
    5716 
    5717 <tr>
    5718      <td valign="top">Title</td>
    5719      <td valign="top">Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange</td>
    5720 </tr>
    5721 
    5722 <tr>
    5723      <td valign="top">Journal</td>
    5724      <td valign="top">Computer Networks</td>
    5725 </tr>
    5726 
    5727 <tr>
    5728      <td valign="top">Year</td>
    5729      <td valign="top">2014</td>
    5730 </tr>
    5731 
    5732 
    5733 
    5734 <tr>
    5735      <td valign="top">DOI</td>
    5736      <td valign="top">10.1016/j.bjp.2013.12.024</td>
    5737 </tr>
    5738 
    5739 
    5740 
    5741 <tr>
    5742      <td valign="top">URL</td>
    5743      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.024">http://dx.doi.org/10.1016/j.bjp.2013.12.024</a></td>
    5744 </tr>
    5745 
    5746 
    5747 </li>
    5748 
    5749 </table></div><br><br>
    5750 
    5751 
    5752 
    5753 
    5754 <a class="EntryGoto" id="Mandal, A. and Ruth, P. and Baldin, I. and Xin, Yufeng and Castillo, C. and Rynge, M. and Deelman, E."></a>
    5755 <b class="myheading" style="position: relative; left: 5%;">Mandal, A. and Ruth, P. and Baldin, I. and Xin, Yufeng and Castillo, C. and Rynge, M. and Deelman, E.</b>
    5756 
    5757 <div class="BibEntry">
    5758 
    5759 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5760 
    5761 <li>
    5762 
    5763 
    5764 <tr>
    5765      <td valign="top">Author</td>
    5766      <td valign="top">Mandal, A. and Ruth, P. and Baldin, I. and Xin, Yufeng and Castillo, C. and Rynge, M. and Deelman, E.</td>
    5767 </tr>
    5768 
    5769 <tr>
    5770      <td valign="top">Title</td>
    5771      <td valign="top">Leveraging and Adapting ExoGENI Infrastructure for Data-Driven Domain Science Workflows</td>
    5772 </tr>
    5773 
    5774 <tr>
    5775      <td valign="top">Booktitle</td>
    5776      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    5777 </tr>
    5778 
    5779 <tr>
    5780      <td valign="top">Publisher</td>
    5781      <td valign="top">IEEE</td>
    5782 </tr>
    5783 
    5784 <tr>
    5785      <td valign="top">Year</td>
    5786      <td valign="top">2014</td>
    5787 </tr>
    5788 
    5789 <tr>
    5790      <td valign="top">Abstract</td>
    5791      <td valign="top">In this paper, we present our ongoing work on a novel use of networked cloud infrastructures like GENI for running adaptive domain science applications. We specifically report our recent experience at the SC'13 conference with showcasing a dynamically adaptable cloud infrastructure driven by the demand of a data-driven scientific workflow. Our work used resources from ExoGENI - a Networked Infrastructure-as-a-Service (NIaaS) testbed funded through NSF's Global Environment for Network Innovation (GENI) project. We used on-ramps to compute and data resources in the RENCI SC'13 booth to a large dynamically provisioned 'slice' spanning multiple ExoGENI cloud sites that were interconnected using dynamically provisioned connections from Internet2, NLR and ESnet. The slice was used to execute a scientific workflow driven from a computer in the RENCI SC'13 booth connected to the slice via SCinet. A closed-loop control mechanism leveraging a monitoring infrastructure based on persistent queries adapted the slice to the demands of the workflow as it executed.</td>
    5792 </tr>
    5793 
    5794 
    5795 
    5796 <tr>
    5797      <td valign="top">DOI</td>
    5798      <td valign="top">10.1109/gree.2014.12</td>
    5799 </tr>
    5800 
    5801 
    5802 
    5803 <tr>
    5804      <td valign="top">URL</td>
    5805      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.12">http://dx.doi.org/10.1109/gree.2014.12</a></td>
    5806 </tr>
    5807 
    5808 
    5809 </li>
    5810 
    5811 </table></div><br><br>
    5812 
    5813 
    5814 
    5815 
    5816 <a class="EntryGoto" id="Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I."></a>
    5817 <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</b>
    5818 
    5819 <div class="BibEntry">
    5820 
    5821 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5822 
    5823 <li>
    5824 
    5825 
    5826 <tr>
    5827      <td valign="top">Author</td>
    5828      <td valign="top">Mandvekar, Lokesh and Qiao, Chunming and Husain, Mohammad I.</td>
    5829 </tr>
    5830 
    5831 <tr>
    5832      <td valign="top">Title</td>
    5833      <td valign="top">Enabling Wide Area Single System Image Experimentation on the GENI Platform</td>
    5834 </tr>
    5835 
    5836 <tr>
    5837      <td valign="top">Booktitle</td>
    5838      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    5839 </tr>
    5840 
    5841 <tr>
    5842      <td valign="top">Location</td>
    5843      <td valign="top">Salt Lake City, UT</td>
    5844 </tr>
    5845 
    5846 <tr>
    5847      <td valign="top">Publisher</td>
    5848      <td valign="top">IEEE</td>
    5849 </tr>
    5850 
    5851 <tr>
    5852      <td valign="top">Year</td>
    5853      <td valign="top">2013</td>
    5854 </tr>
    5855 
    5856 
    5857 
    5858 <tr>
    5859      <td valign="top">DOI</td>
    5860      <td valign="top">10.1109/GREE.2013.27</td>
    5861 </tr>
    5862 
    5863 
    5864 
    5865 <tr>
    5866      <td valign="top">URL</td>
    5867      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.27">http://dx.doi.org/10.1109/GREE.2013.27</a></td>
    5868 </tr>
    5869 
    5870 
    5871 </li>
    5872 
    5873 </table></div><br><br>
    5874 
    5875 
    5876 
    5877 
    5878 <a class="EntryGoto" id="Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming"></a>
    5879 <b class="myheading" style="position: relative; left: 5%;">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</b>
    5880 
    5881 <div class="BibEntry">
    5882 
    5883 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5884 
    5885 <li>
    5886 
    5887 
    5888 <tr>
    5889      <td valign="top">Author</td>
    5890      <td valign="top">Mandvekar, Lokesh and Sathyaraja, Anandatirtha and Qiao, Chunming</td>
    5891 </tr>
    5892 
    5893 <tr>
    5894      <td valign="top">Title</td>
    5895      <td valign="top">Socially Aware Single System Images</td>
    5896 </tr>
    5897 
    5898 <tr>
    5899      <td valign="top">Booktitle</td>
    5900      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    5901 </tr>
    5902 
    5903 <tr>
    5904      <td valign="top">Location</td>
    5905      <td valign="top">Los Angeles</td>
    5906 </tr>
    5907 
    5908 <tr>
    5909      <td valign="top">Year</td>
    5910      <td valign="top">2012</td>
    5911 </tr>
    5912 
    5913 <tr>
    5914      <td valign="top">Abstract</td>
    5915      <td valign="top">Cloud computing enables users to get access to huge amounts of computing resources as desired. There are many popular commercial cloud service providers which provide resources to users at a price. These providers can not be trusted as far as privacy of data is concerned. On the other hand, people do trust their close friends, relatives and other social contacts, albeit, to varying degrees. This paper reports the work-in-progress on S3I(Socially Aware Single System Images) which allows users to form computing clusters using resources owned by their social contacts. It tries to utilize the trust found between people in real life and translate it to provide trustworthy resource sharing between them.</td>
    5916 </tr>
    5917 
    5918 
    5919 
    5920 
    5921 
    5922 
    5923 </li>
    5924 
    5925 </table></div><br><br>
    5926 
    5927 
    5928 
    5929 
    5930 <a class="EntryGoto" id="Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil"></a>
    5931 <b class="myheading" style="position: relative; left: 5%;">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</b>
    5932 
    5933 <div class="BibEntry">
    5934 
    5935 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5936 
    5937 <li>
    5938 
    5939 
    5940 <tr>
    5941      <td valign="top">Author</td>
    5942      <td valign="top">Marasevic, Jelena and Janak, Jan and Schulzrinnedag, Henning and Zussman, Gil</td>
    5943 </tr>
    5944 
    5945 <tr>
    5946      <td valign="top">Title</td>
    5947      <td valign="top">WiMAX in the Classroom: Designing a Cellular Networking Hands-on Lab</td>
    5948 </tr>
    5949 
    5950 <tr>
    5951      <td valign="top">Booktitle</td>
    5952      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    5953 </tr>
    5954 
    5955 <tr>
    5956      <td valign="top">Location</td>
    5957      <td valign="top">Salt Lake City, UT</td>
    5958 </tr>
    5959 
    5960 <tr>
    5961      <td valign="top">Publisher</td>
    5962      <td valign="top">IEEE</td>
    5963 </tr>
    5964 
    5965 <tr>
    5966      <td valign="top">Year</td>
    5967      <td valign="top">2013</td>
    5968 </tr>
    5969 
    5970 
    5971 
    5972 <tr>
    5973      <td valign="top">DOI</td>
    5974      <td valign="top">10.1109/GREE.2013.29</td>
    5975 </tr>
    5976 
    5977 
    5978 
    5979 <tr>
    5980      <td valign="top">URL</td>
    5981      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.29">http://dx.doi.org/10.1109/GREE.2013.29</a></td>
    5982 </tr>
    5983 
    5984 
    5985 </li>
    5986 
    5987 </table></div><br><br>
    5988 
    5989 
    5990 
    5991 
    5992 <a class="EntryGoto" id="Maziku, H. and Shetty, S."></a>
    5993 <b class="myheading" style="position: relative; left: 5%;">Maziku, H. and Shetty, S.</b>
    5994 
    5995 <div class="BibEntry">
    5996 
    5997 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    5998 
    5999 <li>
    6000 
    6001 
    6002 <tr>
    6003      <td valign="top">Author</td>
    6004      <td valign="top">Maziku, H. and Shetty, S.</td>
    6005 </tr>
    6006 
    6007 <tr>
    6008      <td valign="top">Title</td>
    6009      <td valign="top">Network Aware VM Migration in Cloud Data Centers</td>
    6010 </tr>
    6011 
    6012 <tr>
    6013      <td valign="top">Booktitle</td>
    6014      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    6015 </tr>
    6016 
    6017 <tr>
    6018      <td valign="top">Publisher</td>
    6019      <td valign="top">IEEE</td>
    6020 </tr>
    6021 
    6022 <tr>
    6023      <td valign="top">Year</td>
    6024      <td valign="top">2014</td>
    6025 </tr>
    6026 
    6027 <tr>
    6028      <td valign="top">Abstract</td>
    6029      <td valign="top">Host virtualization allows data centers to live migrate an entire virtual Machine (VM) to support data center maintenance, disaster avoidance and workload balancing. Live VM Migration can consume nearly the entire bandwidth for memory intensive applications which impacts the performance of competing flows in the network. A network-aware VM Migration operation ensures a fair share allocation of network resources, leading to a seamless Virtual Machine mobility while minimizing degradation of network performance. Recently, VMPatrol was proposed as a network aware VM Migration model which uses a single physical machine and QoS policies to simulate and implement a cost of migration model. However, the performance evaluation of VMPatrol was conducted in an emulated environment. In this paper, we empirically evaluate the performance of VMPatrol in an experimental GENI testbed characterized by wide-area network dynamics and realistic traffic scenarios. We deploy OpenFlow end to end QoS policies to reserve minimum bandwidths required for successful VM Migration. Preliminary results demonstrate that enforcing QoS policies in terms of bandwidth reservation relieves the network of possible overloads during migration. The results indicate that time taken to complete VM Migration depends on VM's memory size, VM page dirty rate and the available bandwidth. The results also indicate that length of stop copy phase and minimum required progress amount are critical parameters in estimating the VM migration cost.</td>
    6030 </tr>
    6031 
    6032 
    6033 
    6034 <tr>
    6035      <td valign="top">DOI</td>
    6036      <td valign="top">10.1109/gree.2014.18</td>
    6037 </tr>
    6038 
    6039 
    6040 
    6041 <tr>
    6042      <td valign="top">URL</td>
    6043      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.18">http://dx.doi.org/10.1109/gree.2014.18</a></td>
    6044 </tr>
    6045 
    6046 
    6047 </li>
    6048 
    6049 </table></div><br><br>
    6050 
    6051 
    6052 
    6053 
    6054 <a class="EntryGoto" id="Maziku, Hellen and Shetty, Sachin and Rogers, Tamara"></a>
    6055 <b class="myheading" style="position: relative; left: 5%;">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</b>
    6056 
    6057 <div class="BibEntry">
    6058 
    6059 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6060 
    6061 <li>
    6062 
    6063 
    6064 <tr>
    6065      <td valign="top">Author</td>
    6066      <td valign="top">Maziku, Hellen and Shetty, Sachin and Rogers, Tamara</td>
    6067 </tr>
    6068 
    6069 <tr>
    6070      <td valign="top">Title</td>
    6071      <td valign="top">Measurement-based IP Geolocation of Routers on Planetlab Infrastructure</td>
    6072 </tr>
    6073 
    6074 <tr>
    6075      <td valign="top">Booktitle</td>
    6076      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6077 </tr>
    6078 
    6079 <tr>
    6080      <td valign="top">Location</td>
    6081      <td valign="top">Los Angeles</td>
    6082 </tr>
    6083 
    6084 <tr>
    6085      <td valign="top">Year</td>
    6086      <td valign="top">2012</td>
    6087 </tr>
    6088 
    6089 <tr>
    6090      <td valign="top">Abstract</td>
    6091      <td valign="top">Location aware applications can benefit from a more accurate yet robust IP geolocation framework. Various approaches to IP geolocation have been well documented. The most recent approach casts IP geolocation as a machine learn- ing classification problem. This approach makes it possible to incorporate both delay and non delay based information. The accuracy of IP geolocation can be improved by incorporating additional types of geolocation information rather relying on network delay alone. To enhance the classification accuracy of the existing classification framework, we expand it to include 6 features (3 of which are novel). We use PlanetLab as a testbed to generate our measurement set. We select 67 PlanetLab nodes within the United States with known geographic location as our landmarks. We test the accuracy of our framework on 23,843 routers given ping measurements from the 67 landmarks. With only three features (average delay, average hops and population density) tested, our new classifier gives a reduced average error distance of 157.81 miles and a median error distance of 0 miles, compared to the present classifier that gives an average error distance of 253.34 miles. This is very promising as we move on to the next phase of incorporating data for the remaining 5 features. To the best of our knowledge, this is the first proposed framework that aims to improve the accuracy of the present classifier based IP geolocation.</td>
    6092 </tr>
    6093 
    6094 
    6095 
    6096 
    6097 
    6098 
    6099 </li>
    6100 
    6101 </table></div><br><br>
    6102 
    6103 
    6104 
    6105 
    6106 <a class="EntryGoto" id="McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan"></a>
    6107 <b class="myheading" style="position: relative; left: 5%;">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</b>
    6108 
    6109 <div class="BibEntry">
    6110 
    6111 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6112 
    6113 <li>
    6114 
    6115 
    6116 <tr>
    6117      <td valign="top">Author</td>
    6118      <td valign="top">McKeown, Nick and Anderson, Tom and Balakrishnan, Hari and Parulkar, Guru and Peterson, Larry and Rexford, Jennifer and Shenker, Scott and Turner, Jonathan</td>
    6119 </tr>
    6120 
    6121 <tr>
    6122      <td valign="top">Title</td>
    6123      <td valign="top">OpenFlow: enabling innovation in campus networks</td>
    6124 </tr>
    6125 
    6126 <tr>
    6127      <td valign="top">Journal</td>
    6128      <td valign="top">SIGCOMM Comput. Commun. Rev.</td>
    6129 </tr>
    6130 
    6131 <tr>
    6132      <td valign="top">Publisher</td>
    6133      <td valign="top">ACM</td>
    6134 </tr>
    6135 
    6136 <tr>
    6137      <td valign="top">Address</td>
    6138      <td valign="top">New York, NY, USA</td>
    6139 </tr>
    6140 
    6141 <tr>
    6142      <td valign="top">Year</td>
    6143      <td valign="top">2008</td>
    6144 </tr>
    6145 
    6146 
    6147 
    6148 <tr>
    6149      <td valign="top">DOI</td>
    6150      <td valign="top">10.1145/1355734.1355746</td>
    6151 </tr>
    6152 
    6153 
    6154 
    6155 <tr>
    6156      <td valign="top">URL</td>
    6157      <td valign="top"><a href="http://doi.acm.org/10.1145/1355734.1355746">http://doi.acm.org/10.1145/1355734.1355746</a></td>
    6158 </tr>
    6159 
    6160 
    6161 </li>
    6162 
    6163 </table></div><br><br>
    6164 
    6165 
    6166 
    6167 
    6168 <a class="EntryGoto" id="Medhi, Deep and Ramamurthy, Byrav and Scoglio, Caterina and Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Cherukuri, Ramkumar and Liu, Xuan and Angu, Pragatheeswaran and Bavier, Andy and Buffington, Cort and Sterbenz, James P. G."></a>
    6169 <b class="myheading" style="position: relative; left: 5%;">Medhi, Deep and Ramamurthy, Byrav and Scoglio, Caterina and Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Cherukuri, Ramkumar and Liu, Xuan and Angu, Pragatheeswaran and Bavier, Andy and Buffington, Cort and Sterbenz, James P. G.</b>
    6170 
    6171 <div class="BibEntry">
    6172 
    6173 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6174 
    6175 <li>
    6176 
    6177 
    6178 <tr>
    6179      <td valign="top">Author</td>
    6180      <td valign="top">Medhi, Deep and Ramamurthy, Byrav and Scoglio, Caterina and Rohrer, Justin P. and &#x43;&#x0327;etinkaya, Egemen K. and Cherukuri, Ramkumar and Liu, Xuan and Angu, Pragatheeswaran and Bavier, Andy and Buffington, Cort and Sterbenz, James P. G.</td>
    6181 </tr>
    6182 
    6183 <tr>
    6184      <td valign="top">Title</td>
    6185      <td valign="top">The GpENI testbed: Network infrastructure, implementation experience, and experimentation</td>
    6186 </tr>
    6187 
    6188 <tr>
    6189      <td valign="top">Journal</td>
    6190      <td valign="top">Computer Networks</td>
    6191 </tr>
    6192 
    6193 <tr>
    6194      <td valign="top">Year</td>
    6195      <td valign="top">2014</td>
    6196 </tr>
    6197 
    6198 <tr>
    6199      <td valign="top">Abstract</td>
    6200      <td valign="top">The Great Plains Environment for Network Innovation (GpENI) is an international programmable network testbed centered initially in the Midwest US with the goal to provide programmability across the entire protocol stack. In this paper, we present the overall GpENI framework and our implementation experience for the programmable routing environment and the dynamic circuit network (DCN). GpENI is built to provide a collaborative research infrastructure enabling the research community to conduct experiments in Future Internet architecture. We present illustrative examples of our experimentation in the GpENI platform.</td>
    6201 </tr>
    6202 
    6203 
    6204 
    6205 <tr>
    6206      <td valign="top">DOI</td>
    6207      <td valign="top">10.1016/j.bjp.2013.12.027</td>
    6208 </tr>
    6209 
    6210 
    6211 
    6212 <tr>
    6213      <td valign="top">URL</td>
    6214      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.027">http://dx.doi.org/10.1016/j.bjp.2013.12.027</a></td>
    6215 </tr>
    6216 
    6217 
    6218 </li>
    6219 
    6220 </table></div><br><br>
    6221 
    6222 
    6223 
    6224 
    6225 <a class="EntryGoto" id="Mekky, H. and Jin, Cheng and Zhang, Zhi-Li"></a>
    6226 <b class="myheading" style="position: relative; left: 5%;">Mekky, H. and Jin, Cheng and Zhang, Zhi-Li</b>
    6227 
    6228 <div class="BibEntry">
    6229 
    6230 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6231 
    6232 <li>
    6233 
    6234 
    6235 <tr>
    6236      <td valign="top">Author</td>
    6237      <td valign="top">Mekky, H. and Jin, Cheng and Zhang, Zhi-Li</td>
    6238 </tr>
    6239 
    6240 <tr>
    6241      <td valign="top">Title</td>
    6242      <td valign="top">VIRO-GENI: SDN-Based Approach for a Non-IP Protocol in GENI</td>
    6243 </tr>
    6244 
    6245 <tr>
    6246      <td valign="top">Booktitle</td>
    6247      <td valign="top">Research and Educational Experiment Workshop (GREE), 2014 Third GENI</td>
    6248 </tr>
    6249 
    6250 <tr>
    6251      <td valign="top">Publisher</td>
    6252      <td valign="top">IEEE</td>
    6253 </tr>
    6254 
    6255 <tr>
    6256      <td valign="top">Year</td>
    6257      <td valign="top">2014</td>
    6258 </tr>
    6259 
    6260 <tr>
    6261      <td valign="top">Abstract</td>
    6262      <td valign="top">Non-IP protocols always presented a challenge for network researchers to deploy and test at large scale. GENI infrastructure presents a testbed to deploy large scale network experiments, however, non-IP protocols still raises a challenge to deploy since IP is the narrow waist of the Internet. SDN provides an opportunity implement non-IP protocols, however, the OpenFlow standard is still tied to Ethernet/IP/TCP protocol stack. In the paper, we utilize SDN to provide a framework to deploy and test a non-IP protocol, Virtual Id Routing (VIRO), in GENI using an extended Open vSwitch platform.</td>
    6263 </tr>
    6264 
    6265 
    6266 
    6267 <tr>
    6268      <td valign="top">DOI</td>
    6269      <td valign="top">10.1109/gree.2014.14</td>
    6270 </tr>
    6271 
    6272 
    6273 
    6274 <tr>
    6275      <td valign="top">URL</td>
    6276      <td valign="top"><a href="http://dx.doi.org/10.1109/gree.2014.14">http://dx.doi.org/10.1109/gree.2014.14</a></td>
    6277 </tr>
    6278 
    6279 
    6280 </li>
    6281 
    6282 </table></div><br><br>
    6283 
    6284 
    6285 
    6286 
    6287 <a class="EntryGoto" id="Mitroff, Sarah"></a>
    6288 <b class="myheading" style="position: relative; left: 5%;">Mitroff, Sarah</b>
    6289 
    6290 <div class="BibEntry">
    6291 
    6292 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6293 
    6294 <li>
    6295 
    6296 
    6297 <tr>
    6298      <td valign="top">Author</td>
    6299      <td valign="top">Mitroff, Sarah</td>
    6300 </tr>
    6301 
    6302 <tr>
    6303      <td valign="top">Title</td>
    6304      <td valign="top">Lawrence Landweber Helped Build Today's Internet, Now He's Advising Its Future</td>
    6305 </tr>
    6306 
    6307 <tr>
    6308      <td valign="top">Journal</td>
    6309      <td valign="top">Wired</td>
    6310 </tr>
    6311 
    6312 <tr>
    6313      <td valign="top">Year</td>
    6314      <td valign="top">2012</td>
    6315 </tr>
    6316 
    6317 
    6318 
    6319 
    6320 
    6321 <tr>
    6322      <td valign="top">URL</td>
    6323      <td valign="top"><a href="http://www.wired.com/business/2012/08/lawrence-landweber/">http://www.wired.com/business/2012/08/lawrence-landweber/</a></td>
    6324 </tr>
    6325 
    6326 
    6327 </li>
    6328 
    6329 </table></div><br><br>
    6330 
    6331 
    6332 
    6333 
    6334 <a class="EntryGoto" id="Muhammad, Monzur and Cappos, Justin"></a>
    6335 <b class="myheading" style="position: relative; left: 5%;">Muhammad, Monzur and Cappos, Justin</b>
    6336 
    6337 <div class="BibEntry">
    6338 
    6339 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6340 
    6341 <li>
    6342 
    6343 
    6344 <tr>
    6345      <td valign="top">Author</td>
    6346      <td valign="top">Muhammad, Monzur and Cappos, Justin</td>
    6347 </tr>
    6348 
    6349 <tr>
    6350      <td valign="top">Title</td>
    6351      <td valign="top">Towards a Representive Testbed: Harnessing Volunteers for Networks Research</td>
    6352 </tr>
    6353 
    6354 <tr>
    6355      <td valign="top">Booktitle</td>
    6356      <td valign="top">First GENI Research and Educational Experiment Workshop (GREE 2012)</td>
    6357 </tr>
    6358 
    6359 <tr>
    6360      <td valign="top">Location</td>
    6361      <td valign="top">Los Angeles</td>
    6362 </tr>
    6363 
    6364 <tr>
    6365      <td valign="top">Year</td>
    6366      <td valign="top">2012</td>
    6367 </tr>
    6368 
    6369 <tr>
    6370      <td valign="top">Abstract</td>
    6371      <td valign="top">A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Sev- eral systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure various applications. However in the long run such testbeds will be unable to keep up and meet all the demands of many of the large scale modern day peer-to-peer systems. We outline the various challenges and essentials of a networking testbed and we provide an alternate network- ing testbed that is driven by resources that are voluntarily contributed. We talk about the various advantages and dis- advantages of the Seattle system, an open source peer-to- peer computing testbed that has the potential to meet these demands. The testbed is composed of sandboxed resources that are donated by volunteers. Seattle has been deployed for about three years and supports many researchers who are interested in a networking testbed. The testbed consists of over 4100 nodes and is constantly growing. Seattle looks to grow and meet the demands of networking testbeds as they are made.</td>
    6372 </tr>
    6373 
    6374 
    6375 
    6376 
    6377 
    6378 
    6379 </li>
    6380 
    6381 </table></div><br><br>
    6382 
    6383 
    6384 
    6385 
    6386 <a class="EntryGoto" id="Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram"></a>
    6387 <b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</b>
    6388 
    6389 <div class="BibEntry">
    6390 
    6391 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6392 
    6393 <li>
    6394 
    6395 
    6396 <tr>
    6397      <td valign="top">Author</td>
    6398      <td valign="top">Narisetty, RajaRevanth and Dane, Levent and Malishevskiy, Anatoliy and Gurkan, Deniz and Bailey, Stuart and Narayan, Sandhya and Mysore, Shivaram</td>
    6399 </tr>
    6400 
    6401 <tr>
    6402      <td valign="top">Title</td>
    6403      <td valign="top">OpenFlow Configuration (OFConfig) Protocol: Implementation for the OF Management Plane</td>
    6404 </tr>
    6405 
    6406 <tr>
    6407      <td valign="top">Booktitle</td>
    6408      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Workshop</td>
    6409 </tr>
    6410 
    6411 <tr>
    6412      <td valign="top">Location</td>
    6413      <td valign="top">Salt Lake City, UT</td>
    6414 </tr>
    6415 
    6416 <tr>
    6417      <td valign="top">Publisher</td>
    6418      <td valign="top">IEEE</td>
    6419 </tr>
    6420 
    6421 <tr>
    6422      <td valign="top">Year</td>
    6423      <td valign="top">2013</td>
    6424 </tr>
    6425 
    6426 
    6427 
    6428 <tr>
    6429      <td valign="top">DOI</td>
    6430      <td valign="top">10.1109/GREE.2013.21</td>
    6431 </tr>
    6432 
    6433 
    6434 
    6435 <tr>
    6436      <td valign="top">URL</td>
    6437      <td valign="top"><a href="http://dx.doi.org/10.1109/GREE.2013.21">http://dx.doi.org/10.1109/GREE.2013.21</a></td>
    6438 </tr>
    6439 
    6440 
    6441 </li>
    6442 
    6443 </table></div><br><br>
    6444 
    6445 
    6446 
    6447 
    6448 <a class="EntryGoto" id="Narisetty, RajaRevanth and Gurkan, Deniz"></a>
    6449 <b class="myheading" style="position: relative; left: 5%;">Narisetty, RajaRevanth and Gurkan, Deniz</b>
    6450 
    6451 <div class="BibEntry">
    6452 
    6453 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6454 
    6455 <li>
    6456 
    6457 
    6458 <tr>
    6459      <td valign="top">Author</td>
    6460      <td valign="top">Narisetty, RajaRevanth and Gurkan, Deniz</td>
    6461 </tr>
    6462 
    6463 <tr>
    6464      <td valign="top">Title</td>
    6465      <td valign="top">Identification of network measurement challenges in OpenFlow-based service chaining</td>
    6466 </tr>
    6467 
    6468 <tr>
    6469      <td valign="top">Booktitle</td>
    6470      <td valign="top">Local Computer Networks Workshops (LCN Workshops), 2014 IEEE 39th Conference on</td>
    6471 </tr>
    6472 
    6473 <tr>
    6474      <td valign="top">Publisher</td>
    6475      <td valign="top">IEEE</td>
    6476 </tr>
    6477 
    6478 <tr>
    6479      <td valign="top">Year</td>
    6480      <td valign="top">2014</td>
    6481 </tr>
    6482 
    6483 <tr>
    6484      <td valign="top">Abstract</td>
    6485      <td valign="top">Software-defined networking and Network Function Virtualization (NFV) have simplified the coordination efforts for ” service chaining.” Consequently, network services such as firewall, load balancing, etc. may be service chained in the forwarding (data) plane for specific applications and/or traffic. A specific case is for the firewall rules that depend on deep packet inspection for application identification. If a particular application is identified and is ” safe,” would it be worthwhile to program the data plane to bypass the FW for the duration of the application session? For such a traffic-steering case, we report measurement challenges on various setups and the related cost analysis based on the network delay. Measurements of the network and processing delay have been performed with virtualized resources, on GENI testbed, and with isolated hardware units. Experiences are also reported on how a commercial firewall virtual appliance has been deployed on the GENI testbed for experimentation. The results illustrate the measurement uncertainties and challenges for DPI-based traffic steering in virtualized environments. In addition, we show that such a service chaining may increase throughput and relieve DPI-based processing overhead on firewall units.</td>
    6486 </tr>
    6487 
    6488 
    6489 
    6490 <tr>
    6491      <td valign="top">DOI</td>
    6492      <td valign="top">10.1109/lcnw.2014.6927718</td>
    6493 </tr>
    6494 
    6495 
    6496 
    6497 <tr>
    6498      <td valign="top">URL</td>
    6499      <td valign="top"><a href="http://dx.doi.org/10.1109/lcnw.2014.6927718">http://dx.doi.org/10.1109/lcnw.2014.6927718</a></td>
    6500 </tr>
    6501 
    6502 
    6503 </li>
    6504 
    6505 </table></div><br><br>
    6506 
    6507 
    6508 
    6509 
    6510 <a class="EntryGoto" id="Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala"></a>
    6511 <b class="myheading" style="position: relative; left: 5%;">Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</b>
    6512 
    6513 <div class="BibEntry">
    6514 
    6515 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6516 
    6517 <li>
    6518 
    6519 
    6520 <tr>
    6521      <td valign="top">Author</td>
    6522      <td valign="top">Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</td>
    6523 </tr>
    6524 
    6525 <tr>
    6526      <td valign="top">Title</td>
    6527      <td valign="top">Evaluation of tiered routing protocol in floating cloud tiered internet architecture</td>
    6528 </tr>
    6529 
    6530 <tr>
    6531      <td valign="top">Journal</td>
    6532      <td valign="top">Computer Networks</td>
    6533 </tr>
    6534 
    6535 <tr>
    6536      <td valign="top">Year</td>
    6537      <td valign="top">2014</td>
    6538 </tr>
    6539 
    6540 <tr>
    6541      <td valign="top">Abstract</td>
    6542      <td valign="top">Clean slate future Internet initiatives have been ongoing for a few years. An important consideration in the eventual deployment of solutions for such Internet architectures is the testing and validation of the design and its scalability in realistic network environments. Large scale emulation and experimentation testbeds sponsored and funded by major research organizations worldwide provide a suitable platform for the purpose. In this article, we present the implementation details of a new network and routing protocol that entirely replaces IP and its routing protocols from the protocol stack to provide efficient routing and forwarding of packets in a clean slate Floating Cloud Tiered (FCT) Internet architecture. The FCT architecture leverages the tier structure existing among ISPs, and has a new addressing and routing schema based on tiers. In this article, the implementation and evaluation details of the network protocol with these two features, namely the tiered addressing and tier-based routing using the Global Environmental for Network Innovations (GENI) testbed are presented. The performance of the protocol is also compared with Open Shortest Path First (OSPF) implemented over the GENI testbed for identical network topologies.</td>
    6543 </tr>
    6544 
    6545 
    6546 
    6547 <tr>
    6548      <td valign="top">DOI</td>
    6549      <td valign="top">10.1016/j.bjp.2013.11.010</td>
    6550 </tr>
    6551 
    6552 
    6553 
    6554 <tr>
    6555      <td valign="top">URL</td>
    6556      <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.11.010">http://dx.doi.org/10.1016/j.bjp.2013.11.010</a></td>
    6557 </tr>
    6558 
    6559 
    6560 </li>
    6561 
    6562 </table></div><br><br>
    6563 
    6564 
    6565 
    6566 
    6567 <a class="EntryGoto" id="O'Neill, Derek and Aikat, Jay and Jeffay, Kevin"></a>
    6568 <b class="myheading" style="position: relative; left: 5%;">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>
    6569 
    6570 <div class="BibEntry">
    6571 
    6572 <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;">
    6573 
    6574 <li>
    6575 
    6576 
    6577 <tr>
    6578      <td valign="top">Author</td>
    6579      <td valign="top">O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</td>
    6580 </tr>
    6581 
    6582 <tr>
    6583      <td valign="top">Title</td>
    6584      <td valign="top">Experiment Replication using ProtoGENI nodes</td>
    6585 </tr>
    6586 
    6587 <tr>
    6588      <td valign="top">Booktitle</td>
    6589      <td valign="top">2013 Proceedings Second GENI Research and Educational Experiment Wor